merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
Intrusion Detection Systems (IDS) cont. � False Positives, False Negatives, and Subversion Attacks � A false positive occurs when the system classifies an action as anomalous when it is legitimate � A false negative occurs when an intrusive action has occurred but the system allows it to pass as nonintrusive behavior � A subversion error occurs when an intruder modifies the operation of the intrusion detector to force false negatives to occur © Pearson Education Information Security: Principles and Practices 34
Virtual Private Networks (VPNs) � VPN is a network technology that makes it possible to establish private “tunnels” over the public Internet � IP security (IPSec) operates at both the Network Layer and Session Layer of the TCP/IP protocol stack � IPSec VPNs are the most common form in use today and are widely available from network and firewall providers © Pearson Education Information Security: Principles and Practices 35
- Page 1 and 2: Information Security Principles and
- Page 3 and 4: Network Security in Context � Con
- Page 5 and 6: OSI Reference Model cont. © Pearso
- Page 7 and 8: OSI Reference Model and TCP/IP cont
- Page 9 and 10: OSI Reference Model and TCP/IP cont
- Page 11 and 12: OSI Model and Security � Security
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19 and 20: Firewalls � Firewalls typically r
- Page 21 and 22: Firewalls cont. � Bastion Hosts
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33: Intrusion Detection Systems (IDS) c
- Page 37 and 38: Virtual Private Networks (VPNs) con
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
Virtual Private Networks (VPNs)<br />
� VPN is a network technology that makes it<br />
possible to establish private “tunnels” over<br />
the public Internet<br />
� IP security (IPSec) operates at both the<br />
Network Layer and Session Layer of the<br />
TCP/IP protocol stack<br />
� IPSec VPNs are the most common form in<br />
use today and are widely available from<br />
network and firewall providers<br />
© Pearson Education Information Security:<br />
Principles and Practices 35