0% found this document useful (0 votes)
10 views6 pages

UNIT5-CS

The document discusses various cybersecurity devices and protocols, including firewalls, intrusion detection systems (IDS), and access control mechanisms. It outlines their functionalities, advantages, and limitations in protecting networks from unauthorized access and malicious attacks. Additionally, it emphasizes the importance of security policies and monitoring to maintain data integrity and confidentiality.

Uploaded by

piyushgaikwad961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views6 pages

UNIT5-CS

The document discusses various cybersecurity devices and protocols, including firewalls, intrusion detection systems (IDS), and access control mechanisms. It outlines their functionalities, advantages, and limitations in protecting networks from unauthorized access and malicious attacks. Additionally, it emphasizes the importance of security policies and monitoring to maintain data integrity and confidentiality.

Uploaded by

piyushgaikwad961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

*Faeoal: Ih aa typeay newak setuity deice that

ltes incOM0vg & hewoy traffic usthzity


foticia ttat have peiauay been set ioside an auig
-It a s ao a baiei beheen asted
te tenal ocnk 4 utwstedextenal
netuok (ike he Igtenet)
ADoking: Flo oatth the nho taic againat
LAN F/
Po the ue t deioed io ts tabe Oho tbenek
iA matthed, assaiale abon io dppied to the no tata.
-Ruleo can be defioed onthe Fo based ootte neeity as
seurity poiie athe mgauiation.nFo iltes bath isbound
and atbound tae - Flho can filtea pactets based onteu
SOUAcaAdsainaddess pot oumbes.
auttoriedcomnu
Smos Dacceo 2Aeepta
a)Enbabces data piaygseunit )Helps canoly uith.uig
3,Liitasans-DSetiog up gnoaagi Rdeuay'asoeconshig
and ditjust a)Beatise uoae guety ulebased they
3 giaht not abe to
be abe
oet be to Aeapa thuea

my pot be abla to
hat cpedte
ttat entpaunt level
aaddmjeatues
4 s)Puchasingaflo ad ocan be erpersi

) Appcton
a) Ciicuuib leuel
Aspect Pactet 7lteuig |state inspecon o
Dlotig pociy Aestac basal mudes Pteo kaad on contet
Dlaue agevatnpeialeo snlaypa &laueat oreat aup, B,43
s) (onnecfmstate statelo stateu
4Seurity leuel |Easic keuel seuitg
Fost l s souua ioersiveslso,meenesouoioese
oNplerules
TValneabit mone vulheaHe Bette

entapriegode
'usted sustem These aeQSpeial sstns deaigred to sene
entued
thepupaz avidig seuitySaeya
he susten aaaiostmalciss sto
Land thid paty ipedusestoao
ace

he conpite ystom. TSae Afaponsibefh poningsg


atdiaeut leveloand based a iteet pausmetts
-TMualeel eeuit-Tho type TS ensua that seuityis
miotained atdieent levels systomThe seLnty leks
Top Secet(Ts) Seuet (s level, canidesta CYleel
Unclassiked (u) level
-Read up and Read daunae nat pemitted in this typeST3. s
featue )It enoacea sell.degned'sqmal seurity päe
sensitve data, 2)Contokpbo anaccer Tohet
handlio
esouce wodde Dhat Conditons )Taioains loas y tacb al
sigigant seurit-Aeladed euena veiieo bbetslmgs
acen Ersueo tatysem ia potected eorm anauth accen
Lsith ston
TS-iitzy gade seme sskem Bantig slw
acess cont 9)0s ithoulsevel eut
*IDS:Tt a cyberseuity taot that mDoitoAs no msyste
achibe o maGcius acha onpoicy violahms. - It deds
aunawthosetacce aattaco - Itallts Dbena seunty
beach ia detected It analyzea trakte sJdet p
baimpl bebaau. Oanba
a boet asitse Analyato ata usig nleo ybeaiau models
a)Geneaea alelo s suapiciaus nabaomal ocity is fut.
-DNebon baced Ds 2)Hostbaced DS 2)sioatu-badis
Anommly-based IDs s)Hybid IDs
DNINS Ithoonitos ente olo aktc to detet asicinsaaty
tis insalJed Psategic paiota like nules and hieualk.
Ear Detecng apat sh a bos attackaoss the pehaut.
3 Pos)lavetmubple desae a) Doeon't ispact ystem petoan
HS-TH monitsasaty onasiale bostadence,incig
sustkmalls,ple accesa aod lage -tisinstald anindhdal
saner -Egi-Detedwnautthosaa loachang Sna Sele
3 Pasi-ione detilediszbapeht )Detecte ioside thet.
3DEIDsTLCOmpaAes ehsattatic to nSattact Siqotue
1 -Like Aut roatehes dataagiost adboj thno thuats.
Pos DEBectie joa bnan thhaats 3)Lao
2Cons!: ) (an notdetect unboonattads
se positses
a b)ADS-It delecs deiakons pDm oal behaiou npatta,
a-It uses ML a stassal msdek taidentk4unusal achiity
Pos!-Candetect neD nob theak
Consi DRinhe tase poife 2)Nedtaisy nbAbel behana
SHDs:TtzAro Bines both synatuebased omaly baedett
Conprehesie delecin mchanis ucith
Advantaqea of lDS!-ldenbjeo wnauthoiaed acces
aloae and'uspiciaus bebaviuineattine.aMonitos
nehont oY bost to detectany aanoroakas 2Geneala alert
tp system admls almuing zuick aeaponse a)Hels og
Paoridea iosights into o
meot Alatony Aeqioasla )
6) A L s ceasan usoo We to
detect specike type st atacka. z)Io ust
enhanco seunthy by Pddeciog iotena thaete.
*initansay geneale any alets 7onnamal acsite
causiog alet aae)mayoiss neus iobnanattacts
a)IDS ant blookattacka 4)Can atect oehnror
bost petonmanedue to canbousus monitbing aaging
lage enionOEat ischalieng
Aspect IPS

Dfunckan oitas sdtets maiciauMonitosdetecs gbloct


oaiciaus aiity
9Boo taen aenettesalerts o
aletson Aatomatialytabe actn E
bsiimio folusuallyplaced cuksdethe Plaad iaioeunt
htpassie)
Reace Poacthve
S)Riskoabe+ Canalet wOneCeSAUiy can blok leaioal tafg *
lan intado lateny
oaiotenana
s)ricnauy ucease Montaing alehig Rah time thaeat blocbig
) Ezanople SNORTtbs mode, Shoat(PSAade) isco lP -
OSStc,
* Acces contol SeurotySeviço i-nAate Dho an aoa.
YeSOUceo naolo On systunde ohbatcondiios and obat
achms hey aeaaed to petomIt preuens anautboiged
acce to sesive iotnmahm. Ensue
E s yauthorized wsas
modiyyadelete data. TMainoroponb ot ACae
)Autbenhasanof ses ) Authoraahm
9Audig to nooDitaaandECOAd Uselachons.
T4paibisaeoayAen Contotene stheAeCGUES
depaeaten 0tfenoissins
Nanatny Aceoo ConbtAccem basd onchssijcaton
a) RlebasACcess lotot- Accesgen baad ao uselsle
-faegamplei Aboagitads dh
Dldertiatim Doca lnga io
may plenst
)Autha-Dottestsnassond seS bionscca

3
change biig
4) Accontabili ty AlaeAae lagged oaudit pupocoe.
a Featue Pachet tlteung ute Stateu nspecson flo
3DFunnality iIteLs pactes basd an Ifadd Faca tbe staa
hotand ppotocol. conchn gmhehdesin
Opeate eB,4 4app laye
)ConrmStatele
!4Seuij lae Pasic seunty
stateg
4S)tatnoancaFaste
igheseuity
slaa
L4)oleity Sinple to cog Mane omple tocyug
Ped mstcaues
{Enteprise behson
Pactet ltelng iresa Tt is the most basic
thal opeate at Nehae gTianspodE
layeak asl madel-Itetamines
n eath idcooiog 4autgoig pacbet
Psotect based
20e
picdefed
onting:iDbenadata
tbe
packet ans fto.te fto icspecs
paHet beade. ) Tbeffochech ke teldssuch as SAO
JP,besiohn P, Bsuce font o0, Dessaion pot oPotod
a)The fho compaies tbe pachets beada ingo gainst Liet t
Coniguwcd les. Alsal TCP pakek po 216k.ol toa
)tbepactet atthes anallao ule it is kpuc~ded ta its deoboa
5Aitmatbes dog le, it is dppedabloched.
itatisn'-Dobotndestat cootet 2Dnt veuiy
packet contet evalidity 0es y n1P/ rat leve.
*fpssodManaet ppacaca Heue aue2sidely used paacha
Le passKad aavaea' TE is a slo tatt t seuneystoe
and maaaeo uses passbads n vai
shDng,comple asunde nancoOypted vautl.-Atas
credentals onDebsifeo nd apps. -enealeo andn sKue put
Benento'-Ose don't nead to Anembe pusde-RekO S t paasd
Aeuseeplelastas Bitsauden keoPaa

ae PIG,Seity toon foatAe cngui bon, Fogeipnand


Heneisventapssnd is steln theattacteacant lag io stht
gt

You might also like