Firewall Limitations > Network Security First-Step: Firewalls [PDF]

Feb 8, 2012 - Firewall Limitations. A firewall is a crucial component of securing your network and is designed to addres

7 downloads 18 Views 53KB Size

Recommend Stories


Cisco RV220W Network Security Firewall
You have survived, EVERY SINGLE bad day so far. Anonymous

Firewalls
What you seek is seeking you. Rumi

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Download Network Security Assessment
Goodbyes are only for those who love with their eyes. Because for those who love with heart and soul

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Security Lab 1 Firewall Performance
Suffering is a gift. In it is hidden mercy. Rumi

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Network Security
Happiness doesn't result from what we get, but from what we give. Ben Carson

Network Security
I want to sing like the birds sing, not worrying about who hears or what they think. Rumi

Idea Transcript


Join | Sign In

View Your Cart

Search

Home

Shop By Cert

Formats

Cisco Networking Academy

Deals & Promotions

Video Training

Explore

Community

Home > Articles > Cisco Network Technology > General Networking > Network Security First-Step: Firewalls

You May Also Like

Network Security First-Step: Firewalls

Cisco Programmable Fabric Using VXLAN with BGP EVPN By David Jansen, Lukas Krattiger Feb 9, 2016

By Donald Stoddard, Thomas M. Thomas. Sample Chapter is provided courtesy of Cisco Press. Date: Feb 8, 2012. Save

Digg

Del.icio.us

5 Steps to Building and Operating an Effective Security Operations Center (SOC) By Joseph Muniz Dec 21, 2015

Print

Chapter Information

Contents

Chapter Description

1. Firewall Frequently Asked Questions 2. Firewalls Are "The Security Policy" 3. We Do Not Have a Security Policy 4. Firewall Operational Overview 5. Essentials First: Life in the DMZ

This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.

Overview of Security Operations Center Technologies By Joseph Muniz, Nadhem AlFardan, Gary McIntyre Dec 15, 2015 See All Related Articles

From the Book Network Security First-Step, 2nd Edition $29.59 (Save 20%)

6. Case Studies 7. Firewall Limitations 8. Chapter Summary 9. Chapter Review Questions

Firewall Limitations A firewall is a crucial component of securing your network and is designed to address the issues of data integrity or traffic authentication (via stateful packet inspection) and confidentiality of your internal network (via NAT). Your network gains these benefits from a firewall by receiving all transmitted traffic through the firewall. Your network gains these benefits from a firewall by receiving all transmitted traffic through the firewall. The importance of including a firewall in your security strategy is apparent; however, firewalls do have the following limitations: A firewall cannot prevent users or attackers with modems from dialing in to or out of the internal network, thus bypassing the firewall and its protection completely. Firewalls cannot enforce your password policy or prevent misuse of passwords. Your password policy is crucial in this area because it outlines acceptable conduct and sets the ramifications of noncompliance. Firewalls are ineffective against nontechnical security risks such as social engineering, as discussed in Chapter 1, “There Be Hackers Here.” Firewalls cannot stop internal users from accessing websites with malicious code, making user education critical. Firewalls cannot protect you from poor decisions. Firewalls cannot protect you when your security policy is too lax. NOTE The FBI’s arrest of the phone master’s cracker ring brought several of these security issues to light. These hackers were accused of breaking into credit-reporting databases belonging to Equifax, Inc. and TRW, Inc. and the databases of Nexis/Lexis and Dun & Bradstreet. They also broke into many of the world’s providers. In doing so, these hackers did not use any high-tech attack methods. The phone masters used a combination of social engineering and dumpster diving, both techniques used by attackers that have little technical skill (refer to Chapter 1). Previous Section

About

Affiliates

8. Chapter Summary | Next Section

Cisco Systems, Inc.

Contact Us

FAQ

Jobs

Legal Notice

Privacy Policy

Site Help

Site Map

Write for Us

© 2018 Pearson Education, Cisco Press. All rights reserved. 800 East 96th Street, Indianapolis, Indiana 46240

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.