Section 19 : protecting your network

Get Started. It's Free
or sign up with your email address
Section 19 : protecting your network by Mind Map: Section 19 : protecting your network

1. 122. Access control :

1.1. Firewalls by definition is software that’s designed to protect our system from the evils of the Internet we really have two kinds of firewalls :

1.2. 1- stateful firewalls

1.2.1. - Stateful firewalls examine each packet to decide which packet should be blocked

1.3. 2- stateless firewalls

1.3.1. - stateless firewalls use pattern analysis and heuristic to decide which packet should be blocked

2. 123. Testing network security

2.1. - open ports allows access into a computer or devices

2.2. - There Plus there are two different vulnerability scanners that are actually very good there’s 1- Nessus 2- NMAP has a very pretty graphical front entrance windows users

2.3. - Honey pots it’s nothing more than a computer that looks like a server ( fake server)

2.4. honeynet that is exactly like a honey pot except it manifests as a complete multiple computers

3. 124. Mitigating network threats

3.1. - Implement properly mitigation techniques to protect the network

3.2. - Mitigation threats have 4 big areas:

3.2.1. 1- training and awareness

3.2.2. - 2- patch management

3.2.3. - 3- policies and procedures

3.2.4. - 4- incident response

4. 126. Firewalls

4.1. - Firewalls have 2 things to do :

4.2. - 1- stateful firewalls : are aware of the conversation going through them

4.3. - 2- stateless firewalls filters based on ports and IP addresses

5. 120. Threats

5.1. - Two types of threats is viruses and worms

5.1.1. - Viruses: is going to do two things :

5.1.1.1. - 1- it’s going to make copies of itself through some method or another

5.1.1.2. - 2- is going to do is activate it’s going to do something usually bad to the infected system

5.1.2. - Worms is a piece of malware that uses the Internet in particular TCP/IP networks and put in to be more detailed to propagate

5.1.3. - The viruses and worms now days it’s called malware

6. 121. Social Engineering

6.1. - Use a shredder to protect against dumpster diving

6.2. - Shoulder surfing is looking over shoulders to get passwords or PIN codes

6.3. - There are ways to avoid shoulder surfing :

6.3.1. - 1- use a screen privacy filter ( they lay over screen and reduce the view angle substantially

6.3.2. - 2- use a password enabled screen saver

6.3.3. - 3- train people to be aware of shoulder surfing

7. 125. Introduction to firewalls

7.1. - firewall by definition is something that filters traffic-based on specific criteria

7.2. - The firewalls typically placement at the edge of network

7.3. - Network firewalls protect the network

8. 127.DMZ

8.1. - DMZ referred to demilitarized zone which is an area of network that hosts public facing servers

8.2. - Bastion host is router open to internet traffic