Προσομοίωση σεναρίου προστασίας δικτύων (Firewalls, DMZ, Access Lists)Adobe PDF (1.85 MB)
Title Details:
Simulation of network perimeter security design (Firewalls, DMZ, Access Lists)
Authors: Cheilas, Konstantinos
Vakaloudis, Alexandros
Politis, Anastasios
Reviewer: Mavridis, Ioannis
Subject: ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > COMPUTER NETWORKS
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > PRINCIPLES OF SECURE DESIGN
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > DEFENSIVE PROGRAMMING
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > NETWORK SECURITY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > PLATFORM SECURITY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > NETWORKING AND COMMUNICATIONS > NETWORKED APPLICATIONS
ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > COMMUNICATION NETWORKS
ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > INTERNET AND APPLICATIONS
ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > SECURE COMMUNICATIONS
ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > NETWORK MANAGEMENT AND SECURITY
Keywords:
Computer Networks
Network Simulation
Network Security
Firewalls
DMZ
Access Lists
Description:
Abstract:
Σκοπός του Εργαστηρίου: Ο σκοπός αυτού του εργαστηρίου είναι η μελέτη των δυνατοτήτων περιμετρικής προστασίας ενός δικτύου και των εργαλείων που προσφέρονται για τον σκοπό αυτό.Προαπαιτούμενες Γνώσεις: Για την εκτέλεση και κατανόηση της άσκησης είναι επιθυμητή η βασική γνώση στοιχείων από τη λειτουργία δρομολογητών, firewalls, εικονικών δικτύων (VLANs) και στοιχείων για τη λειτουργία των λιστών πρόσβασης (access lists). Επίσης, προτείνεται να φρεσκάρετε τις γνώσεις σας πάνω στη διευθυνσιοδότηση συσκευών στο Internet καθώς και σε θέματα υποδικτύωσης.
Linguistic Editors: Bismpa, Anna
Graphic Editors: Papadopoulos, Kyriakos
Type: Chapter
Creation Date: 2015
Item Details:
License: http://creativecommons.org/licenses/by-nc-sa/3.0/gr
Handle http://hdl.handle.net/11419/1772
Bibliographic Reference: Cheilas, K., Vakaloudis, A., & Politis, A. (2015). Simulation of network perimeter security design (Firewalls, DMZ, Access Lists) [Chapter]. In Cheilas, K., Vakaloudis, A., & Politis, A. 2015. Computer Networks - Laboratory Exercises [Laboratory Guide]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/1772
Language: Greek
Is Part of: Computer Networks - Laboratory Exercises
Number of pages 26
Typical Learning Time: PT04H00M00S
Version: 1st ed.
Publication Origin: Kallipos, Open Academic Editions