0% found this document useful (0 votes)
18 views14 pages

Unit 4 NIS

The document discusses various types of gateways, including circuit level and application level gateways, focusing on their security functions and configurations. It highlights the advantages and disadvantages of these gateways, emphasizing the importance of security layers and monitoring for potential threats. Additionally, it covers misuse detection and anomaly detection systems, detailing their roles in network security management.

Uploaded by

Dipali Kamble
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
18 views14 pages

Unit 4 NIS

The document discusses various types of gateways, including circuit level and application level gateways, focusing on their security functions and configurations. It highlights the advantages and disadvantages of these gateways, emphasizing the importance of security layers and monitoring for potential threats. Additionally, it covers misuse detection and anomaly detection systems, detailing their roles in network security management.

Uploaded by

Dipali Kamble
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
ackef- ssource Tp address =Theap. addvess of the 37s —osiieation) Bp address: a Source aod deine en He —feons pat level adress: The _jrensp st level pork number Teper udp a deine, oppress) ; — _ eee Packet V “Detemet Oo Tiuering eee) = Bur Caw! mes T . eas ee ee Yq: packel Fiteving Rewkey~ Cireutt level Gateway: = : T civeutt Level Gatun does no pee’ an end tend) Tep_Cnnectien. “eather [the Gateway Sets up two TCp__Cnnecions , one between thse and a “rep _useT @O_ inner host and one between itself and GO Tep user of outer host . = ances the +wo Connections axe established the gatewa) ty ptesltt “elays Tey Sty ments fram one Ganeef ter} ce the other witht eXem ining the Cntenks - ~The securtty — buncten Spots deteenining uhtch Coamectens ust) be aljene ~ A dy pfeal use of ctraurt level Gateway fs 4d eid uation tn which the System almmntsrater teusts the inter nat} Users . = The Gatewoy can be cokrqured +s Surpert applet, Nevel_ og phicy geevtce ot) Inbound Goneclfons and eheeutt TTevel junckens bre cutharn A nections - \ 7 Sete RY Gans y oursid £ ine ae ae outerde Has T ae CP ae _ = nV Pend Sever exe} (teste Contacts =the gutn as asks “fhe ha oes Conta chs the app least on the wemote host ahd welays Top Sepmenks ‘Containing, the app licotien lata Laweer, the two endl pein ~ —Appltcstion leve] gatway 5 Band fo be move secure than packet: Li hers . =e a Isiieagy un deg and aude al] INComeng tebhic at Lhe application level . I ~-t prime disadvnthe fs the addtifena] sctssing over hen on) each conneck ef) - —figpltetierteve| > Gakwe: outstel € ane eee ennecks) connection | > Sir. 7 outside Hest— " (antt Ssid Hes iy: —Applrertin Level Gafeway | ~fidvan to4 ¢— y = ser has high secuty then’ packe} Yering ‘ : — St tae) deq and audit every Ineoming shattic ! ss ! a —Disedvamtoyes : —ite sate shaud examine. and berared any shablic th beth drrecttens be 2 Scene ot Recoil hue Hoel fect veened host ——F2_dusome the disadvantage of a: trewe || single timed basiien Galayu atten, anether conbty uration fs available Fnewn as paced Host btrewdl| Dual -—tomed Bastien - | — cen this Wee ob Gnktguvation , the direct cnnecttins Vetween the fntenal hess and the packer Miter axe avetded : — Here, “rhe packet Eerie Connects onty te the appli qahway, which in fur has 4 deperete Connection: with Hhe inteenal hests- : ! —_ Hense, tk packet Ketter Zs Successbuily atkeked then onl? applfcrdier) gateway is visibie + the anackey | at wil povide | secutiy t: Tntesna| | hests- a f | M1 o : T t Fipniiertier) Gateway HTTP [packet bre rc Tl STP [os me | 7 Er | [-reuner] tengl hetwedle y Fig: Sbual femal Bastien) 3. Serened Suh : . = is “This type ok cenkr ye yee: guroten, bles hiphnst oteudiy amen the pest ble anktquratiery: at ipa] = aa TE Kg “im preve versto) over al| the availthe —~T scheme of biewal) Cnbiquretton | = T+ uses wo packet” fiijers one between the innet intebe and applratie) qatevoy and fhe inienal new. Ee = ~Thas +his Conbrauration achive 3 levels of ‘Steurtty bev an aywoker + break into ae PE Eg heya gateway +} tnt | socket fer I SMTP. | =| 7 ft of = Aacket, TELNET} - Iiveing ] | Lo i Tate onal hetwerk a7 2 Bij: Sweened Subnet Firewall] Linijele b smuieHien|s« 1b. Frewai Sek preted) ageinsp > = { Toside theeet 5 2_Packe Ler Brvewa)) does nok Pevide anf enka = iHerin 9 7 Svea] 3 Protect. dunnieling ie Send; deta i t s i HE Sending daty brem one Fee] taother Soojuce) which neyates He : Purpose ok Frewall 4 En cpie bea kite Cannot be examine’ and dilser - Dmz: Tt iS 4 Comprier fi inserted as 4 "neutral zone" est oF Smal] network iN a Companys _pritere. Network - “eb } = aveids outside Usets From acting dirck access ta Companyis deta servers 7 A_2m2 35 lan opHend| but mere secure appreach theg Freeway Te Gan ekbectivey ack as pox server” i ifs = The ty tieal Mz Cenbiyuratien has g Seperate Cmp- uier ov hist. Ina nehoork, which -raeetes request om users within the private neboryk ote access q website o gublic nepwor . ~The pmz_host- "tneHates Session box each requests on the public netuork but is nef able + inthate q Stsstoy back inte the _gvvale Newark. Tran only hoc word packets whrch "Tas been Brg useted by | host u prvale/ Thier I public| Exteena hy Dal Reseurees Jo Epes oe 13 I l | SAT FRE J Urt PY i nena) ew \) bivewd | Advantage . “The main bent ob a ome fs povide an intemal pj with on addzitera| Steuvity layer by westricHing access " sensi ive date and sevens i what is Test afin _inteusten cetectie System Ts q_device that monttes gq +tabbic ber pmalict— ous aekviy os 4elicy vielsken and send alert on I detector r ‘ ; Yulnerability Assesmenf-: S ~ / Vunevabtlaey —assement— is examining the Stete ob netucbk Seantty_ = Data abaut en | ports slo mpackage ~yuaning T T : =] network | -fopoleqy Netcare Glected an ef Jepviovttield the List of viunevabilities. ~ \junevabilfey assesment needs te be. Lipdated [seq last) te Nendie new thraks =o Seourity. I ao Misuse tection : — \ Misuse. detection Jo Caljed! — signature detecteQ in an apreeach” in which a4 ahecK Pattern ov unguthevized and, — Susticeus be vices Are Jeomned based of Fe past activities and then the Knouteda ¢ es Thou the. feared = pattens is used + detect ev predict | subsequent simijqy ee | such patter {h_q O{w. track — Siq nature may Grin ne ok Tareed Soqig Ae_sensttive host. | bis in rp addass + : — = = publer_overbiew axfack Anomaly Deletion : : C— ma ' 5 L— Ay anomly Detection System) __ unseel) "aHacks has the abiliry deck new and subs ntial cin _aeaise an _eavly alewary bebere_an damaye, de network Could be dene. by the atack } Hest cone aps: Host Inbansen Detection system F hess or device on dhe nlw the Ingmtay — od outgoing wil] der uns oN independ eu — A HTns _ meniters Yeo the device eal packet s the admintsraty 1 _ maltctouls noite ts detected. [ Lates | Larabee) Trea bbic Ane lysis (sey colject | enghne interlace / | ' | L T Loy aye -Meram | of Repos) Hires Storage Ea: Componcats ob Het Based TS a snapshot ob existing Systen) — Th Sasi tekes } Ht with the evils fies and Compares? ieyatipg latrines | Pago No. p Dato | Le Cd —— 5 = tb The analytics) sysier bijes were ed th : q ox deleted oq alert ts sent fo the ra Adminishatear fo investyate. o> An ex of prps usaqe cn be seen of mis sten Gea! machines, whrch ave ot expected fo change —thete [ey out ——fssic_Cripenents oper ps : 7 Tra Vic Caliech oe 4 “This Component G@llechS _acti- MY ee events fom the "ps + examine On Host based rps this can be dog Files 4 audtt Megs oy fabic aming te oF leaving Q specibre SY stem. froalysis Engine + + “This Compenet examines the Collected O) -brabkic ‘and Compares Tt ¥ EL te known patties of malrofous factviry es Ste in the Stynatur database. 7 he Analy sis engine acs like 4 berg 4 ok the Tos. > Signature Database: = Te Ps q_Gliection of + pattens and dekinatiins of Enewn malfeiaas + Tachvity. + T + User Tnterbace S pepertin 4 thes the _Cmpenenk- 4 Hat totes beces with human elemehty beovicing alters and giving the usera q rorane tot Interact with W<- operate thes. —-r — Network Based. musi Deleaier: Geter. = Natwok based “rps Kecuce.s “on ; net a ~ feva bie __wthe Lths ane Ly tes: : revelling r the cabies an wives that Intercennect J the System. = A nebwork tbs Sheud check the jw fPatbic s when it passes and ft ts able te onal~ze. yale dccerding te pectee) pe -omeunt destimatray ete: — eee CS Gewrce Networ) dase rps shots ber ccefatn ach ite “pentl of service | 2 : post SCANS ! iz ; lice Content in the det patie ok a packet crafan hers ancl worms Brute force attec kK Sig nota age Coyanens $f network ros —___Heney_ peices ie eae oh ae ee Aten Sep _eNgaye ond device hackers and Se maltcioug “Activities » over he: Totem ef - —_——— ~The heney pots are feed +e do He following 3 Piver4’ “the aHlenlien ob potential] 4 AHacker. at 2. Cliect inkrmatery abot the intra dex’s a Le chien. a J a. poovide encugerement- fe the ohackew J - + se/as te stay” bor seme time atilewirng Fe | the admin sHeatar fe -delefe- Hts and ba silt act on this. i | —_=_teneypets ave designed her 2 Amperfent- goals ~ a 4 roke Them steok = Hike hay veal like a Sy stenos: g 2: De not qjjow (eq Himate uses fo know about % access hem. Webstever— t } beeper) ; Detwer ~ Tatesnet pivewd |}

You might also like