Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix The only safe computer is a dead computer... The Threats Denial-of-Service Unauthorized Access Execution of Unauthorized Commands Breaches of Confidentiality Destructive Behavior Who Are These Guys? activists club initiates competitors consultants crackers for hire crackers customers cyber-gangs deranged people drug cartels economic rivals extortionists foreign agents and spies Fraudsters global coalitions government agencies hackers hoodlums Industrial espionage experts information warriors infrastructure warriors insiders maintenance people military organizations nation states nature organized crime paramilitary groups police private investigators professional thieves reporters terrorists tiger teams vandals vendors whistle blowers Basic Security Backup, Backup, Backup Control Where Data Is Located Decentralize Your Security System Your Operating System May Not Be Your Friend Firewalls: Locking Out The World Firewall Terminology Bastion Host Router Access Control List (ACL) Demilitarized Zone (DMZ) Proxy Stateful Inspection Network Address Translation (NAT) Hardware Firewall Software Firewall How It Works Firewalls & the OSI