Cryptography and Network Security
Cryptography and Network Security
Network Security
Chapter 20
Fourth Edition
by William Stallings
Lecture slides by Lawrie Brown
Chapter 20 Firewalls
The function of a strong position is to make
the forces holding it practically
unassailable
On War, Carl Von Clausewitz
Introduction
What is a Firewall?
a choke point
Firewall Limitations
cannot protect from attacks bypassing it
Bastion Host
Firewall Configurations
Firewall Configurations
Firewall Configurations
Access Control
given system
can decompose by
Reference Monitor
Common Criteria
evaluation criteria
methodology for application of criteria
administrative procedures for evaluation, certification and
accreditation schemes
Common Criteria
defines set of security requirements
functional
assurance
components
Common Criteria
Requirements
Functional Requirements
Assurance Requirements
Common Criteria
Common Criteria
Summary
have considered:
firewalls
types of firewalls
configurations
access control
trusted systems
common criteria