Flylib.com AdChoices
Network and Security
Firewall Internet
Firewall Network
Security Firewall
Firewall Test
Network Design
Chapter 20. Firewalls P R EV IO U S P A G E
TA BLE O F C O N TEN T
N EX T P A G E
[Page 621] 20.1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations 20.2 Trusted Systems Data Access Control The Concept of Trusted Systems Trojan Horse Defense 20.3 Common Criteria for Information Technology Security Evaluation Requirements Profiles and Targets 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Review Questions, and Problems Key Terms Review Questions Problems
[Page 622] The function of a strong position is to make the forces holding it practically unassailable. On War, Carl Von Clausewitz On the day that you take up your command, block the frontier passes, destroy the official tallies, and stop the passage of all emissaries. The Art of War, Sun Tzu
Key Points A firewall forms a barrier through which the traffic going in each direction must pass. A firewall security policy dictates which traffic is authorized to pass in each direction. A firewall may be designed to operate as a filter at the level of IP packets, or may operate at a higher protocol layer. A trusted system is a computer and operating system that can be verified to implement a given security policy. Typically, the focus of a trusted system is access control. A policy is implemented that dictates what objects may be accessed by what subjects. The common criteria for information technology security is an international standards initiative to define a common set of security requirements and a systematic means of evaluating products against those requirements.
Firewalls can be an effective means of protecting a local system or network of systems from network-based security threats while at the same time affording access to the outside world via wide area networks and the Internet. We begin this chapter with an overview of the functionality and design principles of firewalls. Next, we address the issue of the security of the firewall itself and, in particular, the concept of a trusted system, or secure operating system.
P R EV IO U S P A G E
TA BLE O F C O N TEN T
N EX T P A G E
Cryptography and Network Security (4th Edition) ISBN: 0131873164
Year: 2005
EAN: 2147483647
Pages: 209
Authors: William Stallings
BU Y O N A MA ZO N
Simiral book on Amazon
CompTIA Project+ Study Guide: Exam PK0003
Cryptography Engineering: Design Principles and Practical Applications
B UI L DI NG W E B APPL I CAT I O NS W I T H UML (2 ND E DI T I O N)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Network Security Essentials: Applications and Standards (4th Edition)
A PRACT I T I O NE RS G UI DE T O S O FT W ARE T E S T DE S I G N
Computer Networking: A Top-Down Approach (5th Edition)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
E XCE L S CI E NT I FI C AND E NG I NE E RI NG CO O K B O O K (CO O K B O O K S (O RE I L L Y))
HTML
Th e Tes tin g Proces s
Leveragin g C op y, C u t, Pas te, an d Pas te S p ecial
A ctivities
U s e C as e Tes tin g
Tak in g A d van tage of Macros
D is cu s s ion
S ection I I - Wh ite Box Tes tin g Tech n iq u es
I n trod u ction
HTML Frames
Tes t Plan n in g
Work in g w ith D ata Typ es
S amp le S creen S h ots
S ection V - S ome Fin al Th ou gh ts
A s s es s in g Good n es s of Fit
CUL T URAL I MPE RAT I VE : G L O B AL T RE NDS I N T H E 2 1 S T CE NT URY
From 2,000,000 B.C . to A .D .2000: Th e R oots an d R ou tes of C u ltu re C u ltu re an d C limate C ogn itive Proces s es Th e C h in a Ph en omen on A p p en d ix B Lead ers h ip Tes t Flylib.com © 2008-2017. If you may any questions please contact us:
[email protected]
PRO G RAMMI NG . NE T W I NDO W S APPL I CAT I O NS
Hello World Win d ow s Forms Web A p p lication s V ers u s Win d ow s A p p lication s D ialog Boxes C ommon D ialog C las s es
FI L E MAK E R 8 FUNCT I O NS AND S CRI PT S DE S K RE FE RE NCE
Text Formattin g Fu n ction s C ou n t() D ayOfY ear() Get(High C on tras tS tate) V arian ce()
Privacy policy