Professional Documents
Culture Documents
CyberSecurity Short Course - Week 3
CyberSecurity Short Course - Week 3
CyberSecurity Short Course - Week 3
Part of the :
Master of Networking and Systems Administration
Master of Management (IT)
Overview
• Secure Design
• Defense in Depth
• The Perimeter
• System Security
• Network Security
• Best Practice Design Principles
Security Implementation
Defense in Depth
• *Many* models
Defense in Depth
• An information assurance (IA) concept in which multiple layers of
security controls (defense) are placed throughout an information
technology (IT) system.
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
• Application fingerprinting
• Must be able to correctly identify applications flowing through them by traffic contents
• QoS
Core Functions
• NAT
• Static, dynamic, PAT
• Often debated as a valid security measure