Introduction to Perimeter Security: Unit 3 Presentation

Verified

Added on  2022/10/11

|7
|483
|22
Presentation
AI Summary
This presentation, created for a Unit 3 individual project, provides an overview of perimeter security. It covers five key topics: state-based filters, demilitarized zones (DMZs), intrusion prevention systems (IPS), intrusion detection systems (IDS), and proxy firewalls. Each topic includes an explanation of how the security method works, along with its advantages. The presentation, designed with 5-7 slides and detailed speaker notes, aims to elucidate the practical aspects of perimeter security, offering insights into the functionality, benefits, and trade-offs associated with each chosen method. The presentation includes a cover slide and a reference slide to ensure a complete and well-structured analysis of the subject matter.
Document Page
Introduction to Information Assurance and Information Security
Student’s Name
Institutional Affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1. State-based Filter
How the security method works
It is a network firewall which tracks the operating state and connection features
traversing the network.
The firewall is configured to differentiate authentic packets from different
connection type.
Advantages
They offer improved content filtering abilities because they have the capability to
scrutinize the packet payload and make decisions according to real-time content.
Document Page
2. Demilitarized zones (DMZ)
How the security method works
A DMZ is an administrative server that is positioned on a network containing
several network edges to provide local area network users with secure services.
Advantages
It provides organizations additional time to perceive and address openings before
they can further breach into the internal networks (Sadiku, Alam, & Musa, 2017).
Document Page
3. Intrusion prevention system (IPS)
How the security method work
IPS work by flicking through network traffic as it moves across the network and
if it happens to identify a potential attack, it notifies the administrator and
instantly initiate appropriate countermeasures (Sadiku, Alam, & Musa, 2017).
Advantages
Reduced incidents of security: The IPS works to ensure less disruption for
components in a network by reducing the number of security cases.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Intrusion detection system (IDS)
How the security method work
The IDS work by looking for signatures of known attacks of normal activities.
These attacks are moved up the stack and evaluated at a protocol as well as
application layer.
When IDS detects any violations or malicious activity it can report it to an
administrator or collect it centrally by use of a security information and event
management (SIEM) system (Paul, Bhuimali, Aithal, & Rajesh, 2018).
Document Page
5. Proxy Firewalls
How the security method work
A proxy firewall act on behalf of the client by providing right of entry to a network
service by safeguarding each side from direct peer-to-peer connection.
Users who need to interconnect with the terminus server must first creating a link to
the proxy server, then then establish a link to the terminus server on the user’s
behalf.
Document Page
References
Paul, P., Bhuimali, A., Aithal, P. S., & Rajesh, R. (2018). Cyber Security to
Information Assurance: An Overview. International Journal on Recent
Researches in Science, Engineering & Technology (IJRRSET), 6(4), 8-14.
Sadiku, M. N., Alam, S., & Musa, S. M. (2017). Information assurance benefits
and challenges: An introduction. Information & Security, 36(1). http://infosec-
journal.com/system/files/3604_information_assurance.pdf
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]