Page 195 - CISSO_Prep_ Guide
P. 195

Of course, a firewall is only as good as the person that manages
            it, so an important role of the security manager is to verify that
            the staff managing the firewalls and other network devices are
            knowledgeable, trained, and supervised. Firewall logs must be
            reviewed regularly to detect any suspicious activity.



            Proxy
            A proxy is a device that acts as an intermediary between two
            communicating parties. The proxy acts to the party on each side
            of the communication as if it was the other end host. This allows
            it to filter and examine suspicions activity, protect internal
            resources, and take action if an unacceptable activity is
            occurring. A gateway is often a type of proxy that controls
            traffic through a gate or security perimeter.


            DNS

            For most people, the DNS (domain name system) is the
            mechanism that makes the internetwork. Without the DNS, they
            could not navigate to their destination website without knowing
            the IP (internet protocol) address of the website they wanted to
            visit. The DNS provides a simple cross-reference that is used to
            associate a “normal” name with the IP address used by network
            devices. The IP address is a logical address given to a website
            based on the addresses allocated to the ISP (Internet Service
            Provider). Individuals can purchase a name for their website that
            is more in line with their name, the name of their organization,
            or their marketing program. The IP address for Mile2.com, for
            example, is 206.214.216.216. A person wanting to visit the
            Mile2 website could simply type in http://206.214.216.216/.
            That is the “real” address of the website. However, it is much
   190   191   192   193   194   195   196   197   198   199   200