SlideShare uma empresa Scribd logo
1 de 35
 
What is  ISA   Server :- ISA  server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL  PROXY FIREWALL
Proxy server  :-  It’s a server which emulates as a web server 192.168.1.2 Client Proxy Server 192.168.1.1 Zoom.com Internet
HACKING : - Taking over your resources or attempt to bring down your server Types of ATTACK: - 1.  Foot printing :- The way to know the OS and IP of server 2.  Scanning :- Scanning system for bugs and loopholes 3.  DOS Attacks : - Denial Of Service 4.  Exploits : - Writing scripts to bring down server 5.  Trojans : - Sending viruses to steal the DATA 6.  Port Scan : - Scanning ports for getting into applications ETC………
Types of  Attacks 1. Foot Printing The Art of gathering the complete security profiles of an  Organization or a Target Computer By using a combination of Tools and Techniques,  The Hacker can take up the system and determine its Ip address and Domain names
Types of  Attacks 2. Scanning Scanning the System for Bugs and Loopholes in O/S Hacker uses scanning technique to determine which Ports Are open, what services are running and what is the O/S E.G: RETINA, Shadow Security scanner, ANSIL etc
Types of  Attacks 3. DOS Attack Denial of Service attack which is an attempt to get the  Services or the server down by overflowing the buffer E.G: Win spoof 97, My Spoof
Types of  Attacks 4. Exploits Exploits are usually Bugs in Applications or O/S which  can be Exploited by using a piece of Code often referred  as Scripts E.G: CGI scripts, Perl scripts etc
Types of  Attacks 5. Trojan Horses Trojan Horses is program that pretends to be a useful tool But actually installs malicious or damaging software  Trojan Horses can be used to take over the  Remote System. Sending viruses to steal the Data E.G. Netbus , Bo2k
Types of  Attacks 6. Port Scanner Scanning the port to get into the Application E.G: Port Scanner, etc
What is a Firewall : -  A firewall protects networked computers from  intentional hostile intrusions Software Firewall : - Hardware Firewall : - ISA Server Checkpoint Smooth wall Cisco Pix Watch Guard Multicom Ethernet II…..
Types of   FIREWALL Packet Filtering e.g..  ROUTERS Controls data transfer based on  Source & Destination IP Address  TCP/UDP Port of Source & Destination IP Address Packets are allowed or dropped through the device depending on the Access Control List
Application Gateway eg.  PROXY SERVER Packets are allowed based on type of application and IP address Filter Application specific commands such as: HTTP:GET and POST etc Application level Gateways can also be used to:  To Log User Activity and Logins
Statefull Multilayer Inspection This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc…. eg.  ISA SERVER
Flavors of ISA Server Enterprise and Array policies Local only Policy based Support No limit 4 cpu’s only Scalability  Multiple server with Centralized Management Standalone only  Server Deployment Enterprise Edition Standard Edition
ISA Server requirements  : - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Array considerations   Arrays allow a group of ISA Server computers to be treated and managed  as a single, logical entity. They provide scalability, fault tolerance, and load balancing All array members must be in the same Windows 2000 domain and in  the same site
Enterprise Vs Standalone Policies No . Only a local array policy can be applied. Yes . A single policy can be applied to all arrays in the enterprise. Enterprise policy No need for 2000 Domain Can be installed in Windows NT 4.0 domains. Configuration information is stored in the registry. Must be installed only in Windows 2000 domains with Active Directory installed. Active Directory requirement Limited to only one member. Can have one or more member servers. Scalability and fault tolerance Stand-alone server Array  
Enterprise  Tiered Policy  ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level Array
ISA SERVER MODES 1. Firewall mode
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Web Security Introduction Webserver hacking refers to ...
Web Security Introduction Webserver hacking refers to ...Web Security Introduction Webserver hacking refers to ...
Web Security Introduction Webserver hacking refers to ...webhostingguy
 
Kwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures EnKwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures Ensrrm7
 
Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Ubertas
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAlienVault
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSECAws security with HIDS, OSSEC
Aws security with HIDS, OSSECMayank Gaikwad
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter Thoughtworks
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunitiesATMOSPHERE .
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security PuzzleVic Hargrave
 
Website security systems
Website security systemsWebsite security systems
Website security systemsMobile88
 
Securing the Apache web server
Securing the Apache web serverSecuring the Apache web server
Securing the Apache web serverwebhostingguy
 
Packet tracer (network simulation)
Packet tracer (network simulation)Packet tracer (network simulation)
Packet tracer (network simulation)Aldi Nor Fahrudin
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!MSHOWTO Bilisim Toplulugu
 
Ethical hacking mind map
Ethical hacking mind mapEthical hacking mind map
Ethical hacking mind mapdasdwwe1
 

Mais procurados (20)

Web Security Introduction Webserver hacking refers to ...
Web Security Introduction Webserver hacking refers to ...Web Security Introduction Webserver hacking refers to ...
Web Security Introduction Webserver hacking refers to ...
 
Mod security
Mod securityMod security
Mod security
 
Kwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures EnKwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures En
 
Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSECAws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter
 
Windows web-hosting
Windows web-hostingWindows web-hosting
Windows web-hosting
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunities
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security Puzzle
 
Website security systems
Website security systemsWebsite security systems
Website security systems
 
TekOTP Readme
TekOTP ReadmeTekOTP Readme
TekOTP Readme
 
Securing the Apache web server
Securing the Apache web serverSecuring the Apache web server
Securing the Apache web server
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
Packet tracer (network simulation)
Packet tracer (network simulation)Packet tracer (network simulation)
Packet tracer (network simulation)
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
 
Ethical hacking mind map
Ethical hacking mind mapEthical hacking mind map
Ethical hacking mind map
 

Destaque

ISA Server 2006 Administration
ISA Server 2006 AdministrationISA Server 2006 Administration
ISA Server 2006 AdministrationLearnItFirst.com
 
ISA Server 2006
ISA Server 2006ISA Server 2006
ISA Server 2006k4n71na
 
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...fabricemeillon
 
Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Vũ Vương
 
Pitufo Isa Server 2 K6
Pitufo Isa Server 2 K6Pitufo Isa Server 2 K6
Pitufo Isa Server 2 K6Chema Alonso
 
Solaris Operating System - Oracle
 Solaris Operating System - Oracle Solaris Operating System - Oracle
Solaris Operating System - OracleMalan Amarasinghe
 
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...Sonny Brabez
 
Mac OS(Operating System)
Mac OS(Operating System)Mac OS(Operating System)
Mac OS(Operating System)Faizan Shaikh
 

Destaque (12)

ISA Server 2006 Administration
ISA Server 2006 AdministrationISA Server 2006 Administration
ISA Server 2006 Administration
 
ISA Server 2006
ISA Server 2006ISA Server 2006
ISA Server 2006
 
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...
Techdays 2009 - Hyper-V en profondeur, bonnes pratiques et quoi de neuf avec ...
 
Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006
 
Pitufo Isa Server 2 K6
Pitufo Isa Server 2 K6Pitufo Isa Server 2 K6
Pitufo Isa Server 2 K6
 
Security testing
Security testingSecurity testing
Security testing
 
Internship report copy
Internship report copyInternship report copy
Internship report copy
 
ISA & eISA
ISA & eISAISA & eISA
ISA & eISA
 
Solaris Operating System - Oracle
 Solaris Operating System - Oracle Solaris Operating System - Oracle
Solaris Operating System - Oracle
 
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...
EAI/ERP - Petit cours sur le principe du EAI/ERP, Microsoft BizTalk 2006 & Mi...
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Mac OS(Operating System)
Mac OS(Operating System)Mac OS(Operating System)
Mac OS(Operating System)
 

Semelhante a Isa

Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityHecrocro
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
Isa2004 Configuration Guide
Isa2004 Configuration GuideIsa2004 Configuration Guide
Isa2004 Configuration Guideguest60864fc
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devicesphanleson
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxkarthikvcyber
 
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view IPv6 Conference
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Portfolio Project PPT.pptx
Portfolio Project PPT.pptxPortfolio Project PPT.pptx
Portfolio Project PPT.pptxAhmedPinger
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 

Semelhante a Isa (20)

Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Isa2004 Configuration Guide
Isa2004 Configuration GuideIsa2004 Configuration Guide
Isa2004 Configuration Guide
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Security in network
Security in networkSecurity in network
Security in network
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
Day4
Day4Day4
Day4
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Network security
Network securityNetwork security
Network security
 
Portfolio Project PPT.pptx
Portfolio Project PPT.pptxPortfolio Project PPT.pptx
Portfolio Project PPT.pptx
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 

Mais de deshvikas

Printers And Groups
Printers And GroupsPrinters And Groups
Printers And Groupsdeshvikas
 
New Diskmgmt
New DiskmgmtNew Diskmgmt
New Diskmgmtdeshvikas
 
Networking & Intro 2003
Networking & Intro 2003Networking & Intro 2003
Networking & Intro 2003deshvikas
 
Dfs And Disk Quota
Dfs And Disk QuotaDfs And Disk Quota
Dfs And Disk Quotadeshvikas
 
Active Directory Ii
Active Directory   IiActive Directory   Ii
Active Directory Iideshvikas
 
Active Directory I
Active Directory   IActive Directory   I
Active Directory Ideshvikas
 
Printers and groups
Printers and groupsPrinters and groups
Printers and groupsdeshvikas
 
New diskmgmt
New diskmgmtNew diskmgmt
New diskmgmtdeshvikas
 
Dfs and disk quota
Dfs and disk quotaDfs and disk quota
Dfs and disk quotadeshvikas
 
Active directory ii
Active directory   iiActive directory   ii
Active directory iideshvikas
 
Active directory
Active directory Active directory
Active directory deshvikas
 

Mais de deshvikas (15)

Printers And Groups
Printers And GroupsPrinters And Groups
Printers And Groups
 
New Diskmgmt
New DiskmgmtNew Diskmgmt
New Diskmgmt
 
Networking & Intro 2003
Networking & Intro 2003Networking & Intro 2003
Networking & Intro 2003
 
Dns
DnsDns
Dns
 
Dhcp
DhcpDhcp
Dhcp
 
Dfs And Disk Quota
Dfs And Disk QuotaDfs And Disk Quota
Dfs And Disk Quota
 
Active Directory Ii
Active Directory   IiActive Directory   Ii
Active Directory Ii
 
Active Directory I
Active Directory   IActive Directory   I
Active Directory I
 
Printers and groups
Printers and groupsPrinters and groups
Printers and groups
 
New diskmgmt
New diskmgmtNew diskmgmt
New diskmgmt
 
Dns
DnsDns
Dns
 
Dhcp
DhcpDhcp
Dhcp
 
Dfs and disk quota
Dfs and disk quotaDfs and disk quota
Dfs and disk quota
 
Active directory ii
Active directory   iiActive directory   ii
Active directory ii
 
Active directory
Active directory Active directory
Active directory
 

Isa

  • 1.  
  • 2. What is ISA Server :- ISA server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL PROXY FIREWALL
  • 3. Proxy server :- It’s a server which emulates as a web server 192.168.1.2 Client Proxy Server 192.168.1.1 Zoom.com Internet
  • 4. HACKING : - Taking over your resources or attempt to bring down your server Types of ATTACK: - 1. Foot printing :- The way to know the OS and IP of server 2. Scanning :- Scanning system for bugs and loopholes 3. DOS Attacks : - Denial Of Service 4. Exploits : - Writing scripts to bring down server 5. Trojans : - Sending viruses to steal the DATA 6. Port Scan : - Scanning ports for getting into applications ETC………
  • 5. Types of Attacks 1. Foot Printing The Art of gathering the complete security profiles of an Organization or a Target Computer By using a combination of Tools and Techniques, The Hacker can take up the system and determine its Ip address and Domain names
  • 6. Types of Attacks 2. Scanning Scanning the System for Bugs and Loopholes in O/S Hacker uses scanning technique to determine which Ports Are open, what services are running and what is the O/S E.G: RETINA, Shadow Security scanner, ANSIL etc
  • 7. Types of Attacks 3. DOS Attack Denial of Service attack which is an attempt to get the Services or the server down by overflowing the buffer E.G: Win spoof 97, My Spoof
  • 8. Types of Attacks 4. Exploits Exploits are usually Bugs in Applications or O/S which can be Exploited by using a piece of Code often referred as Scripts E.G: CGI scripts, Perl scripts etc
  • 9. Types of Attacks 5. Trojan Horses Trojan Horses is program that pretends to be a useful tool But actually installs malicious or damaging software Trojan Horses can be used to take over the Remote System. Sending viruses to steal the Data E.G. Netbus , Bo2k
  • 10. Types of Attacks 6. Port Scanner Scanning the port to get into the Application E.G: Port Scanner, etc
  • 11. What is a Firewall : - A firewall protects networked computers from intentional hostile intrusions Software Firewall : - Hardware Firewall : - ISA Server Checkpoint Smooth wall Cisco Pix Watch Guard Multicom Ethernet II…..
  • 12. Types of FIREWALL Packet Filtering e.g.. ROUTERS Controls data transfer based on Source & Destination IP Address TCP/UDP Port of Source & Destination IP Address Packets are allowed or dropped through the device depending on the Access Control List
  • 13. Application Gateway eg. PROXY SERVER Packets are allowed based on type of application and IP address Filter Application specific commands such as: HTTP:GET and POST etc Application level Gateways can also be used to: To Log User Activity and Logins
  • 14. Statefull Multilayer Inspection This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc…. eg. ISA SERVER
  • 15. Flavors of ISA Server Enterprise and Array policies Local only Policy based Support No limit 4 cpu’s only Scalability Multiple server with Centralized Management Standalone only Server Deployment Enterprise Edition Standard Edition
  • 16.
  • 17. Array considerations Arrays allow a group of ISA Server computers to be treated and managed as a single, logical entity. They provide scalability, fault tolerance, and load balancing All array members must be in the same Windows 2000 domain and in the same site
  • 18. Enterprise Vs Standalone Policies No . Only a local array policy can be applied. Yes . A single policy can be applied to all arrays in the enterprise. Enterprise policy No need for 2000 Domain Can be installed in Windows NT 4.0 domains. Configuration information is stored in the registry. Must be installed only in Windows 2000 domains with Active Directory installed. Active Directory requirement Limited to only one member. Can have one or more member servers. Scalability and fault tolerance Stand-alone server Array  
  • 19. Enterprise Tiered Policy ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level Array
  • 20. ISA SERVER MODES 1. Firewall mode
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.