Monday, 2025-02-03, 11:47 AM
Welcome, Guest | RSS
Login form
Search
Security Architecture


RISK = (Threats x Vulnerabilities ) / ( Countermeasures )  x Assets.

a) Global Information Assurance Certification(GIAC) Security Architecture.




A complete diagram of GIAC’s security architecture including all public and non rout-able (RFC 1918) private IP addressing is provided in the above diagram.The security architecture consists of concentric systems arranged to help provide "defense-in depth" of GIAC’s three critical Databases. The core systems employed to protect 

GIAC’s network from unauthorized access consist of the following:
1. A Border Router (or "External Router” or "Filtering Router”)
2. A Primary Firewall (or "External Firewall”), which also provides  VPN services
3. A Secondary Firewall (or "Internal Firewall”)

These devices form concentric rings around GIAC’s network that provide three lines of defense between the Internet and GIAC’s most critical assets, the  Databases that house all company information.



b) Typical Corporate network



Calendar
«  February 2025  »
SuMoTuWeThFrSa
      1
2345678
9101112131415
16171819202122
232425262728
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0