On Fri, 18 May 2001, bill.GWood spewed into the ether:
> I need to qualify the terms "Firewall  & DMZ",
Firewall: Any system which protects other systems behind it,
DMZ: Derived from the military demilitarized zone.
         This is a set of machines which can be accessed from the
external world. As such the machines in this zone are more vulnerable
to attack, and need to be hardened further. Also, ideally, these
machines should not contain sensitive data.

> I have read and half digested terms such as "Stealth, Honeypots,
> Secure in Depth, Perimeter and Airgap". 
Honeypots are machines that have data that is made to look valuable,
but is actually not. This is to get the attacker to waste time in
looking at wrong data points, and get caught. Also, since the attacker
is not mucking around with real data, it is supposed to make the admins
life a little bit easier.
Security in depth: This is like building multiple walls to gurad your
machines. You have a certain set of rules on the firewall. Each machine
also has a subset of these rules, as applicable to that machine. If any
of those rules is triggered, then you know that the firewall or an
internal (DMZ) machine has been compromised. Without this ruleset, you
would never know this, and also you might lose data by the time you get
alerted.

> Could some one URL me to a site Which explains these
> in pictures/designs rather than a whole load of text.
Do a google search for this. Can't help you here.

> I want to include a Proxy area for WEB & mail
That would be  a DMZ.

Devdas Bhagat
--
No one is fit to be trusted with power. ... No one. ... Any man who has lived
at all knows the follies and wickedness he's capabe of. ... And if he does
know it, he knows also that neither he nor any man ought to be allowed to
decide a single human fate.
- C. P. Snow, The Light and the Dark
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to