merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
OSI Reference Model and TCP/IP layers 5-7 4 3 1 TELNET FTP SMTP HTTP TCP UDP IP Ethernet Token-Ring ATM © Pearson Education Information Security: Principles and Practices 6
OSI Reference Model and TCP/IP cont. © Pearson Education Information Security: Principles and Practices 7
- Page 1 and 2: Information Security Principles and
- Page 3 and 4: Network Security in Context � Con
- Page 5: OSI Reference Model cont. © Pearso
- Page 9 and 10: OSI Reference Model and TCP/IP cont
- Page 11 and 12: OSI Model and Security � Security
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19 and 20: Firewalls � Firewalls typically r
- Page 21 and 22: Firewalls cont. � Bastion Hosts
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33 and 34: Intrusion Detection Systems (IDS) c
- Page 35 and 36: Virtual Private Networks (VPNs) �
- Page 37 and 38: Virtual Private Networks (VPNs) con
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
OSI Reference Model and TCP/IP<br />
layers<br />
5-7<br />
4<br />
3<br />
1<br />
TELNET FTP SMTP HTTP<br />
TCP UDP<br />
IP<br />
Ethernet Token-Ring ATM<br />
© Pearson Education Information Security:<br />
Principles and Practices 6