ZyXEL ZYWALL IDP 10 User Manual Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 21
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
ZyWALL IDP 10 Quick Start Guide
4
1 Introduction to Intrusions
Refer to the following figure for the introduction.
Figure 1 Intrusions
Figure 1 represents a typical business network consisting of an employee LAN, a DMZ (DeMilitarized
Zone) containing the company web, FTP, mail etc. servers, a firewall and/or NAT router connected to a
broadband modem for Internet access.
Host-based intrusions are what most people call “virus attacks”. The goal of host-based intrusions is to
infiltrate files on an individual computer or server (see 1 in Figure 1) in with the goal of accessing or
destroying confidential information. To protect against host-based intrusions you need to install anti-
virus software on your computer or/and install a device with anti-virus software such as the Prestige
662HW. Sources of host-based attacks are the Internet, telecommuting employees using VPN to access
the company intranet, employees (inadvertently) using infected floppy disks, memory sticks, removable
hard drives etc.
Page view 3
1 2 3 4 5 6 7 8 9 ... 20 21

Comments to this Manuals

No comments