Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013 Defining Firewalls Firewalls are a combination of ___ & ___ What is a “black box?” (p. 502) Default deny or default allow – which one? Types of Firewalls Network-based firewalls protect __ from __. Host-based firewalls protect ____. Access Control Lists How they are processed Lines are compared in sequential order After a match is made, ACL is exited Implicit deny at the end – why? Standard ACLs vs Extended ACLs Inbound vs outbound ACLs Ways to make things more secure DMZ - Image on page 507 Protocol switching – shift to IPX – why? Proxy Services IP proxy Web proxy FTP proxy SMTP proxy More Firewall Stuff Network Layer Firewalls Stateful – Stateless – Application Layer Firewalls Slower, because they … Scanning Services Default Scanning Settings: Filtering for Content Common things to filter: Local Browser Settings Zones Trusted Sites Customizing Settings Intrusion Detection Systems (IDS) More of a watchdog than a firewall Can be software or an actual device Passive responses: (honeypot) - VPN Concentrators Like a firewall, but made for VPNs Allows for higher-speed throughput Allows for encryption Problems Affecting Device Security Physical security – where to keep stuff Climate conditions – Three barriers to your server – Security zones ID Badges Logical Security Configurations Logging On Locally Only administrator can log onto server Administrator must log on locally – why? Access-Control Principles Utilize implicit denies (UNIX) - .allow file (UNIX) - .deny file Least-privilege model Separate administrative duties Rotate administrator jobs Access Control Methods Mandatory Access Control (MAC) Model … Discretionary Access Control (DAC) … Role-Based Access Control (RBAC) … Rule-Based Access Control (RBAC) … Unsecure Protocols (UNIX) – (UNIX) – Secure Protocols