Chapter 3
Chapter 3
1
UPON COMPLETION OF THIS CHAPTER,
YOU SHOULD BE ABLE TO:
2
Terminalogies
Access is the flow of information between a subject and an object.
A subject is an active entity that requests access to an object or the data
within an object.
A subject can be a user, program, or process that accesses an object to
accomplish a task.
When a program accesses a file, the program is the subject and the file is
the object.
An object is a passive entity that contains information.
An object can be a computer, database, file, computer program, directory,
or field contained in a table within a database.
When you look up information in a database, you are the active subject and
the database is the passive object.
3
4
A firewall in an information security program prevents specific
types of information from moving between the outside world,
known as the untrusted network (for example, the internet),
and the inside world.
5
Firewalls can be categorized by processing mode,
development era,
The packet-filtering firewall, also simply called a filtering
firewall, examines the header information of data packets that
come into a network.
6
Application Gateways
The application gateway, also known as an application-level
firewall or application firewall, is frequently installed on a
dedicated computer, separate from the filtering router, but is
commonly used in conjunction with a filtering router.
7
CIRCUIT GATEWAYS
The circuit gateway firewall operates at the transport
layer.
Again, connections are authorized based on
addresses.
Like filtering firewalls, circuit gateway firewalls do not
usually look at traffic flowing between one network
and another, but they do prevent direct connections
between one network and another.
8
MAC Layer Firewalls
MAC layer firewalls are designed to operate at
the media access control sublayer of the data
link layer (Layer 2) of the OSI network model.
9
10
THANK YOU!
11