Managing Cisco Network Security P2
Số trang: 20
Loại file: pdf
Dung lượng: 0.00 B
Lượt xem: 9
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Before the advent of virtual private network (VPN) technology, remote connections were usually through expensive dedicated lines, or smaller organizations may have used on-demand connection technologies such as dial-up over Integrated Services Digital Network (ISDN) or Public Switched Telephone Network (PSTN). VPN has allowed companies to shift their connections to the Internet and save money, but still provide confidentiality and integrity to their communication traffic. Branch offices can be located on the other side of the city or scattered across a continent. They may exist to provide business services, distribution, sales, or technical services closer to the location of customers....
Nội dung trích xuất từ tài liệu:
Managing Cisco Network Security P26 Chapter 1 • Introduction to IP Network Security Figure 1.1 A typical site scenario. WAN Central Site Headquarters Branch Office Laptop Internet Telecommuter Business Laptop Partner PDA Campus Network Before the advent of virtual private network (VPN) technology, remote connections were usually through expensive dedicated lines, or smaller organizations may have used on-demand connection technologies such as dial-up over Integrated Services Digital Network (ISDN) or Public Switched Telephone Network (PSTN). VPN has allowed companies to shift their con- nections to the Internet and save money, but still provide confidentiality and integrity to their communication traffic. Branch offices can be located on the other side of the city or scattered across a continent. They may exist to provide business services, distribu- tion, sales, or technical services closer to the location of customers. These offices can have one, two, or up to hundreds of employees. A branch office usually has business needs to access information securely at the head- quarters site or other branch offices, but due to its smaller size, is con- www.syngress.com Introduction to IP Network Security • Chapter 1 7strained by cost for its connectivity options. When the cost or businessneeds are justified, the branch office would have a permanent connectionto the central headquarters. Most branch offices will also have an Internetconnection. Business partners may be collaborative partners, manufacturers, orsupply chain partners. Technologies such as Electronic Data Interchange(EDI) over proprietary networks have been used by large businesses to per-form transactions, but are difficult and expensive to use. Many companieshave implemented extranets by using dedicated network connections toshare data and operate joint business applications. Extranets and busi-ness-to-business transactions are popular because they reduce businesstransaction cycle times and allow companies to reduce costs and invento-ries while increasing responsiveness and service. This trend will only con-tinue to grow. Business-to-business interactions are now rapidly shifting tothe Internet. Extranets can be built over the Internet using VPN technology. Mobile users and telecommuters typically use dial-up services for con-nectivity to their headquarters or local office. Newer technologies such asDigital Subscriber Line (DSL) or cable modems offer permanent, high-speed Internet access to the home-based telecommuters.TIP It is well known that modems inside your campus network can create a backdoor to your network by dialing out to another network, or being left in answer mode to allow remote access directly to a workstation on your internal network. These backdoors bypass the firewall and other security measures that you may have in place. The always-on Internet connections from home now offer the ability to create the backdoor remotely. It is possible to have an employee or contractor online with a modem to the corporate network remote access facility, while they still have an Internet connection through their DSL or cable modem. Attention to detail in the security policy, workstation con- figuration, and user awareness is critical to ensure that vulnerabilities don’t creep into your system.Host SecurityAny vendor’s software is susceptible to harboring security vulnerabilities.Almost every day, Web sites that track security vulnerabilities, such asCERT, are reporting new vulnerability discoveries in operating systems, www.syngress.com8 Chapter 1 • Introduction to IP Network Security application software, server software, and even in security software or devices. Patches are implemented for these known bugs, but new vulnera- bility discoveries contin ...
Nội dung trích xuất từ tài liệu:
Managing Cisco Network Security P26 Chapter 1 • Introduction to IP Network Security Figure 1.1 A typical site scenario. WAN Central Site Headquarters Branch Office Laptop Internet Telecommuter Business Laptop Partner PDA Campus Network Before the advent of virtual private network (VPN) technology, remote connections were usually through expensive dedicated lines, or smaller organizations may have used on-demand connection technologies such as dial-up over Integrated Services Digital Network (ISDN) or Public Switched Telephone Network (PSTN). VPN has allowed companies to shift their con- nections to the Internet and save money, but still provide confidentiality and integrity to their communication traffic. Branch offices can be located on the other side of the city or scattered across a continent. They may exist to provide business services, distribu- tion, sales, or technical services closer to the location of customers. These offices can have one, two, or up to hundreds of employees. A branch office usually has business needs to access information securely at the head- quarters site or other branch offices, but due to its smaller size, is con- www.syngress.com Introduction to IP Network Security • Chapter 1 7strained by cost for its connectivity options. When the cost or businessneeds are justified, the branch office would have a permanent connectionto the central headquarters. Most branch offices will also have an Internetconnection. Business partners may be collaborative partners, manufacturers, orsupply chain partners. Technologies such as Electronic Data Interchange(EDI) over proprietary networks have been used by large businesses to per-form transactions, but are difficult and expensive to use. Many companieshave implemented extranets by using dedicated network connections toshare data and operate joint business applications. Extranets and busi-ness-to-business transactions are popular because they reduce businesstransaction cycle times and allow companies to reduce costs and invento-ries while increasing responsiveness and service. This trend will only con-tinue to grow. Business-to-business interactions are now rapidly shifting tothe Internet. Extranets can be built over the Internet using VPN technology. Mobile users and telecommuters typically use dial-up services for con-nectivity to their headquarters or local office. Newer technologies such asDigital Subscriber Line (DSL) or cable modems offer permanent, high-speed Internet access to the home-based telecommuters.TIP It is well known that modems inside your campus network can create a backdoor to your network by dialing out to another network, or being left in answer mode to allow remote access directly to a workstation on your internal network. These backdoors bypass the firewall and other security measures that you may have in place. The always-on Internet connections from home now offer the ability to create the backdoor remotely. It is possible to have an employee or contractor online with a modem to the corporate network remote access facility, while they still have an Internet connection through their DSL or cable modem. Attention to detail in the security policy, workstation con- figuration, and user awareness is critical to ensure that vulnerabilities don’t creep into your system.Host SecurityAny vendor’s software is susceptible to harboring security vulnerabilities.Almost every day, Web sites that track security vulnerabilities, such asCERT, are reporting new vulnerability discoveries in operating systems, www.syngress.com8 Chapter 1 • Introduction to IP Network Security application software, server software, and even in security software or devices. Patches are implemented for these known bugs, but new vulnera- bility discoveries contin ...
Tìm kiếm theo từ khóa liên quan:
Quản trị mạng Cơ sở dữ liệu Hệ điều hành Công nghệ thông tin Tin họcGợi ý tài liệu liên quan:
-
Giáo trình Lý thuyết hệ điều hành: Phần 1 - Nguyễn Kim Tuấn
110 trang 451 0 0 -
52 trang 429 1 0
-
62 trang 401 3 0
-
Đề thi kết thúc học phần học kì 2 môn Cơ sở dữ liệu năm 2019-2020 có đáp án - Trường ĐH Đồng Tháp
5 trang 377 6 0 -
24 trang 353 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 312 0 0 -
74 trang 294 0 0
-
Giáo trình Cơ sở dữ liệu: Phần 2 - TS. Nguyễn Hoàng Sơn
158 trang 292 0 0 -
96 trang 291 0 0
-
13 trang 291 0 0