2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet358/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   354   355   356   357   358   359   360   361   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Application Firewalls
An 
application firewall
is a device, server add-on, virtual service, or system filter that defines 
a strict set of communication rules for a service and all users. It’s intended to be an application-
specific server-side firewall to prevent application-specific protocol and payload attacks.

network firewall
is a hardware device, typically called an appliance, designed for gen-
eral network filtering. A network firewall is designed to provide broad protection for an 
entire network.
Both of these types of firewalls are important and may be relevant in many situations. 
Every network needs a network firewall. Many application servers need an application 
firewall. However, the use of an application firewall generally doesn’t negate the need for a 
network firewall. You should use both firewalls in a series to complement each other, rather 
than seeing them as competitive solutions.
Manual Updates
Manual updates should be used in static environments to ensure that only tested and 
authorized changes are implemented. Using an automated update system would allow for 
untested updates to introduce unknown security reductions.


Essential Security Protection Mechanisms 
379
Firmware Version Control
Similar to manual software updates, strict control over firmware in a static environment is 
important. Firmware updates should be implemented on a manual basis, only after testing 
and review. Oversight of 
firmware version control
should focus on maintaining a stable 
operating platform while minimizing exposure to downtime or compromise.
Wrappers

wrapper
is something used to enclose or contain something else. Wrappers are well 
known in the security community in relation to Trojan horse malware. A wrapper of this 
sort is used to combine a benign host with a malicious payload.
Wrappers are also used as encapsulation solutions. Some static environments may be 
configured to reject updates, changes, or software installations unless they’re introduced 
through a controlled channel. That controlled channel can be a specific wrapper. The wrap-
per may include integrity and authentication features to ensure that only intended and 
authorized updates are applied to the system.
Monitoring
Even embedded and static systems should be monitored for performance, violations, com-
pliance, and operational status. Some of these types of devices can perform on-device mon-
itoring, auditing, and logging, while others may require external systems to collect activity 
data. Any and all devices, equipment, and computers within an organization should be 
monitored to ensure high performance, minimal downtime, and detecting and stopping 
violations and abuse.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   354   355   356   357   358   359   360   361   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish