文档介绍:SECURITY
A Checklist for
Network Security
By J. Craig Lowery, .
working has made the explosive growth puter applications possible,
the security liabilities it introduces are extremely problematic. In fact, a system’work
connection is the primary target of most modern security attacks. This article provides a
checklist of security safeguards for system administrators to implement.
etworking—connecting puter to puters— high-end firewalls have extensive customization features for
improves user productivity and quality of life. It boosts implementing security policies but may unduly restrict users
Nefficiency, provides munication methods, if misapplied.
enhances research capabilities, and merce opportuni- How a firewall provides protection is largely determined by
ties. working also increases puter’s vulnerability to how the work connects to the work, which
threats such as data theft, tampering, and service disruptions. is typically the . Figure 1 shows two connection possibili-
Still, these inherent security problems are more than an equitable ties: a routed connection and a proxied connection.
exchange for the capabilities working provides. The
challenge for system administrators is to minimize security risks Firewall with routed connection
without unnecessarily working benefits. A gateway router simply extends the address space and
The pract