Translating the organization’s security needs into safe, reliable and effective network systems needs to start with a simple premise. The purpose of all communications is to exchange information and ideas between people and organizations so that they can get work done.
Those simple goals can be re-expressed in network (and security) terms such as:
- Provide reliable, managed communications between hosts (and users)
- Isolate functions in layers
- Use packets as the basis of communication
- Standardize routing, addressing and control
- Allow layers beyond internetworking to add functionality
- Be vendor-agnostic, scalable and resilient
In the most basic form, a network model has at least two layers:
Which tools help to identify, prevent or both identify and prevent threats? Select identify, prevent or both for each tool.
1. IDS: Identify. An Intrusion Detection System helps to identify threats, but does not have the capability to prevent them.
2. HIDS: Identify. A Host Intrusion Detection System helps to identify threats to a host system, but does not prevent them.
3. NIDS: Identify. A Network Intrusion Detection System helps to identify threats based on network traffic, but does not prevent them.
4. SIEM: Identify. A Security Incident and Event Management system identifies threats by correlating and storing logs from multiple systems, but does not take action to prevent the threats from materializing.
5. Anti-malware/Antivirus: Both. Anti-malware/Antivirus helps to both identify and prevent threats by identifying malicious software and stopping the processes before they fully execute.
6. Scans: Identify. Scans help to identify threats, often by conducting a vulnerability analysis, and may suggest action to mitigate the threats, but does not prevent them.
7. Firewall: Both. Most modern firewalls both identify and prevent threats by automatically adjusting rules to block malicious traffic from entering a secured network.
8. IPS (NIPS/HIPS): Both. Intrusion Prevention Systems both identify and prevent threats.
Nenhum comentário:
Postar um comentário