3.2: Internet communication security countermeasures Flashcards
firewalls
Firewalls are devices that control the flow of messages between networks. Placed at the boundary between the Internet and an organization’s internal network, firewalls enforce a security policy by prohibiting all inbound traffic except for the specific few types of traffic that are permitted to a select few systems.
Types of firewall
- Screening routers
- Stateful inspection firewall
- Application firewall
Screening routers
• Screening routers These simpler firewalls are designed to examine each packet and compare it to an access control list (ACL) to determine whether, based on its source and destination IP addresses and ports, it should be permitted to pass through the firewall.
Stateful inspection firewall
Designed to record incoming packets and keep track of TCP/IP sessions between external and internal.
Stateful inspection firewalls are more complex and capable of more effectively protecting an organization’s network.hosts.
What happens to packet in the TCP protocol
In the TCP protocol, an incoming packet is answered with an outgoing packet and make a go/no-go decision based on whether it believes that the outgoing packet is part of an active session
Application firewall
Application firewalls are devices that are designed to protect web-based applications from application layer attacks.
Application firewalls are designed to block application layer attacks, but not necessarily act as a general-purpose firewall.
DMZ
a separate network where Internet-facing systems are attached and isolated with one or more firewalls.
The rules in the firewall(s) will permit specific services from the Internet to reach the DMZ servers, but will not permit access from the Internet to the internal network.
Honeypot
A honeypot is a trap that is designed to detect unauthorized use of information systems.
A honeypot will have the appearance of a system containing important information and of being unprotected and unmonitored.
Honeynets
A network of computers that are all acting as honeypots to emulate a complex production environment that consists of several computers.