Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY DEVICES AND TECHNOLOGIES (h. Bastion Host (Examples of bastion…
SECURITY DEVICES AND TECHNOLOGIES
h. Bastion Host
a special purpose computer on a network specifically designed and configured to withstand attacks
The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer
It is hardened in this manner primarily due to its location and purpose, either on the outside of a firewall or in a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers.
Examples of bastion host systems/services:
DNS (Domain Name System) server
Email server
FTP (File Transfer Protocol) server
Proxy server
Web server
VPN (Virtual Private Network) server
Placement: There are two common network configurations that include bastion hosts and their placement
The first requires two firewalls, with bastion hosts sitting between the first "outside world" firewall, and an inside firewall, in a DMZ
Often smaller networks do not have multiple firewalls, so if only one firewall exists in a network, bastion hosts are commonly placed outside the firewall
Bastion hosts are related to multi-homed hosts and screened hosts
h. Honeypots
a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, who are then blocked.
This is similar to police sting operations, colloquially known as "baiting," a suspect.
Honeypots may be classified as:
Production honeypots
easy to use, capture only limited information, and are used primarily by corporations
Research honeypots
run to gather information about the motives and tactics of the black hat community targeting different networks
Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations
Based on design criteria, honeypots can be classified as:
pure honeypots
high-interaction honeypots
low-interaction honeypots