Security Basics
Welcome to the Lesson 11.Our goal here is to give you the terminology, the words that your customers are going to want you to know and want you to be able to converse with.
Some of the different kinds of things that an Intrusion Detection System or IDS might detect would be looking in the context of the data, looking for attacks
Why Active Audit? Why is active audit necessary? Many companies rely on their perimeter security. Perimeter can be breached most of the network and its systems are virtually
IPSec assumes that a security association or SA is in place, but does have a mechanism for creating that association. The IETF chose to break the process into
High performance in a firewall is critical. This is driven not only by your end user community, but by some of the applications people plan to use. Today’s
There are a few different types of firewalls. Here’s a little history. The traditional approach was access routers. Using access control lists to control network access.. A low
Policy Enforcement Using Access Control Lists Now we’re going to look at policy enforcement using Access Control Lists. We want the ability to stop and reroute traffic based
Integrity Let’s look at some of the different integrity solutions. Integrity—Network Availability One of the functions of integrity is making sure the network is up. You need to
Let’s explore another methodology of making sure that your system is safe. This is different than the other ones we’ve been touching on. Network Address Translation means security
User Authentication with Kerberos Kerberos is another technology. It is one that has been broken into historically; however, it provides a good level of security. With Kerberos you
RADIUS RADIUS is an access server authentication and accounting protocol that has gained wide support. The RADIUS authentication server maintains user authentication and network access information. RADIUS clients