Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention
In this unit, we will explore the use of security tools such as firewalls and intrusion prevention systems. Following a quick introduction to the concepts of intranet and extranet systems that are frequently used for information exchange by enterprises today, we will look into cryptographic concepts related to securing communication using firewalls. We will explore how firewalls work and will also study different types of intrusion detection systems including host-based and network-based systems.
Completing this unit should take you approximately 9 hours.
6.1: Security Protocols and Solutions
Watch this video. Following a brief introduction to intranets and extranets used frequently today by businesses, Sengupta explains cryptographic concepts related to securing communication using firewalls.
6.2: Firewall
Read this page.
Read this page.
6.3: Host-Based IDS vs. Network-Based IDS
Read this article about host-based and network-based intrusion detection systems.
6.4: Network Attacks and Defense
Read this chapter. While you read, try to explain various attacks, the skills that are needed for carrying out these attacks, and how to defend your system against these attacks.