merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
OSI Reference Model higher level protocols lower level protocols or network services END USER A END USER B Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer End user functions Network functions PHYSICAL MEDIUM Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer higher level protocols lower level protocols or network services © Pearson Education Information Security: Principles and Practices 4
OSI Reference Model cont. © Pearson Education Information Security: Principles and Practices 5
- Page 1 and 2: Information Security Principles and
- Page 3: Network Security in Context � Con
- Page 7 and 8: OSI Reference Model and TCP/IP cont
- Page 9 and 10: OSI Reference Model and TCP/IP cont
- Page 11 and 12: OSI Model and Security � Security
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19 and 20: Firewalls � Firewalls typically r
- Page 21 and 22: Firewalls cont. � Bastion Hosts
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33 and 34: Intrusion Detection Systems (IDS) c
- Page 35 and 36: Virtual Private Networks (VPNs) �
- Page 37 and 38: Virtual Private Networks (VPNs) con
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
OSI Reference Model cont.<br />
© Pearson Education Information Security:<br />
Principles and Practices 5