11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Advanced Security 13Hardware and software firewalls have several modes for filtering network data traffic:■■■Packet filter: A set of rules that allow or deny traffic based on criteria such as IPaddresses, protocols, or ports used.Proxy firewall: A firewall that inspects all traffic and allows or denies packets based onconfigured rules. A proxy acts as a gateway that protects computers inside the network.Stateful packet inspection: A firewall that keeps track of the state of network connectionstraveling through the firewall. Packets that are not part of a known connection arenot allowed back through the firewall.NoteOn a secure network, if computer performance is not an issue, you should enable the internal operatingsystem firewall for additional security. Some applications might not operate properly unless thefirewall is configured correctly for them.Worksheet 16.2.3: Research FirewallsIn this worksheet, you will use the Internet, a newspaper, or a local store to gather informationabout hardware and software firewalls. Refer to the worksheet in IT Essentials: PCHardware and Software Labs and Study Guide, Third Edition (ISBN 1-58713-198-6). Youcan complete this worksheet now or wait to do so until the end of the chapter.Implement a Customer’s Security PolicyAdding layers of security to a network can make the network more secure, but additionallayers of security protection can be expensive. You must weigh the value of the data andequipment to be protected with the cost of protection when implementing the customer’ssecurity policy.After completing the following sections, you will meet these objectives:■■■Configure security settingsDescribe configuring firewall typesDescribe protection against malicious softwareConfigure Security SettingsTwo common security errors are incorrect permissions on folders and files and incorrectconfiguration of wireless security. The sections that follow examine appropriate permissionsettings and wireless security configuration.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!