3-Identify Assets and Infrastructure Devices-11!01!2024
3-Identify Assets and Infrastructure Devices-11!01!2024
• Who are these “hackers” who are trying to break into your
computer?
• Subsequent generations
Positive Effects
• User authentication.
Firewalls can be configured to require user authentication.
This allows network administrators to control ,track specific
user activity.
• Negative Effects
Trusted Untrusted
Network Network
Application Untrusted
Gateway (Proxy Network
service)
Work Station
Application Gateways/Proxies Firewall
• The response is sent back to the application gateway/proxy,
which determines if it is valid and then sends it on to the client.
Strengths
Weaknesses
Administrative Issues
Technical Issues
• Software
– Devil-Linux
– Dotdefender
– ipfirewall
– PF
– Symantec …
• Hardware
– Cisco PIX
– DataPower
– SofaWare Technologies