Section 3 - Security Architecture Principle
Section 3 - Security Architecture Principle
WANs
WLANs
Protection for
Terminate encroyted VPN Traffic initiated by remote users
INTERDEPENDENCIES
Time of Event
SECURITY ARCHITECTURE AND FRAMEWORKS
Changes to permissions
SABSA AND THE ZACHMAN FRAMEWORK
System startup or shutdown THE OPEN GROUP ARCHITECTURE FRAMEWORK (TOGAF)
Login or logout
Network-based IDS
Categories of IDS
Host-based IDS
Signature-Based
Horizontal defense in Depth
Statistical-bsaed Type of IDS Remember Type of Defense in Depth Implementations ( Figure 3.6)
Section 3 : Security
INTRUSION DETECTION SYSTEM Defense in depth Vertical defense in Depth
Neural networls
Authentication ensure
Digital Signature
Non Repudiation
Screened-host firewall
Secure Electronic Transactions (SET)
Dual-homed firewall Example Firewall Implementation
Digital Certificates
Demilitarized zone (DMZ) or screened-subned firewall
Certificate Authority Public Key Infrastructure
Registration authority
Software
hardware
Firewall Platform
virtual platform