EPC on line training
|
The nature of the internet makes it inherently insecure. Various methods are employed to attempt to prevent malicious attacks to web users and web servers. The following are a few examples of the methods used.
FirewallA Firewall is a barrier established in hardware or software, or even both, that monitors and controls the flow of traffic between two networks, usually a private network or the internet. A Firewall provides a single point of entry where security can be concentrated. It allows access to the internet from within an organization and provides tightly controlled access from the internet to the resources on the organizations internal network. The Firewall is usually located away from the rest of the network so that no incoming request can get directly at the internal network resources. There are a number of screening methods, a simple one being to screen requests to make sure they come form previously accepted domain names and IP addresses. Bastion HostA Bastion Host is a computer that acts as the main connection to the internet for users of a Local Area Network (LAN). A bastion host is usually configured in such a way as to minimize the risk of intruders gaining access to the main LAN. It gets its name from the fortified projections on the outer walls of medieval European castles. They are often component parts of a Firewall and may be part of a larger security system which could have many layers of protection. Proxy ServerA Proxy Server is positioned between an internal network and the internet. The Proxy Server filters all outgoing connections so that they appear to be coming form a single machine, in an attempt to conceal the underlying internal network, the proxy server makes it more difficult for an intruder to mount a successful attack. Intrusion detection systemA software package designed to detect specific actions on a network that are typical of an intruder or that might indicate an act of corporate espionage. |
|