Problématique et concepts de base
Firewalls : usages Access control : usage restriction on some protocols/ports/services
Yüklə
446 b.
səhifə
32/43
tarix
02.01.2022
ölçüsü
446 b.
#32251
1
...
28
29
30
31
32
33
34
35
...
43
Bu səhifədəki naviqasiya:
Compliance with the specified protocols
Connection proxies (masking of the internal network)
Firewalls : architecture (VI): managing an internal FW
Firewalls : usages
Access control : usage restriction on some protocols/ports/services
Packet
filtering
Authentication : only authorized users and hosts (machines)
Monitoring for further auditing
Compliance
with the specified protocols
Virus detection
Isolation of the internal
network from the Internet
Data encryption
Connection proxies (masking of the internal network)
Application proxies (masking of the « real » software)
Firewalls : architecture (I)
Firewalls : architecture (VI):
managing an internal FW
Firewalls : some recommendations
Bastion hosts
better to put the bastions in a DMZ
than in an internal network
disable non-required services
do not allow user accounts
fix all OS bugs
safeguard the logs
run a security audit
do secure backups
Yüklə
446 b.
Dostları ilə paylaş:
1
...
28
29
30
31
32
33
34
35
...
43
Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət
gir
|
qeydiyyatdan keç
Ana səhifə
Dərs
Dərslik
Guide
Kompozisiya
Mücərrəd
Mühazirə
Qaydalar
Referat
Report
Request
Review
yükləyin