Page 445 - StudyBook.pdf
P. 445

Topologies and IDS • Chapter 7  429

                 Security Zones


                 The easiest way to think of security zones is to imagine them as discrete network
                 segments holding systems that share common requirements.These common
                 requirements can be:

                      ■  The types of information they handle

                      ■  Who uses them
                      ■  What levels of security they require to protect their data




                 EXAM WARNING
                      A security zone is defined as any portion of a network that has specific
                      security concerns or requirements. Intranets, extranets, DMZs, and
                      VLANs are all security zones.




                    It is possible to have systems in a zone running different OSes, such as
                 Windows Vista and NetWare 6.5.The type of computer, whether a PC, server, or
                 mainframe, is not as important as the security needs of the computer. For example,
                 there is a network that uses Windows 2003 Servers as domain controllers, Domain
                 Name System (DNS) servers, and Dynamic Host Control Protocol (DHCP)
                 servers.There are also Windows XP Professional clients and NetWare 6.5 file
                 servers on the network. Some users may be using Macintosh computers running
                 OS X or OS 9, while others may be running one or more types of Linux or
                 UNIX.This is an extremely varied network, but it may still only have one or two
                 security zones.As stated earlier, the type (or OS) of a computer is not as important
                 with regards to security zones and its role.
                    In the early days of business Internet connectivity, the concept of security zones
                 was developed to separate systems available to the public Internet from private sys-
                 tems available for internal use by an organization.A device that acted as a firewall
                 separated the zones. Figure 7.2 shows a visual representation of the basic firewall
                 concept.











                                                                              www.syngress.com
   440   441   442   443   444   445   446   447   448   449   450