HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Security architecture for connecting to the Internet
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Security architecture for connecting to the Internet  
> Access to the content HTML Beginning of the presentation  
> Description This talk explains how to securely connect a company's LAN to the Internet.  
> Context & Dates Talk made before the ENSI Bourges Security Forum, on 18 December 2001.
 
> Author Jean-Jacques Bernard 
> Type 47 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Agenda
Hervé Schauer Consultants
Principes d'une architecture sécurisée
Cloisonnée
À jour
Exemple
Éléments importants
Éléments secondaires
Architecture multi-strates
Éléments de sécurisation
Moyens
Le filtrage IP
Traduction d'adresse et de port
Le filtrage applicatif
Le relayage applicatif
Mise en oeuvre
Autres fonctions
Ce qui est important aussi
Exemple
État du marché
Conclusion  
> Related documents
themeSecurity Architectures
[Article]  Évolution des attaques de type Cross Site Request Forgery [1 June 2007 - French]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  How to make one's Internet security [5 January 2002 - French]
[Article]  How to set up security systems? [29 March 2001 - French]
[Presentation]  How to insert VPNs in existing security architectures? [29 September 1999 - French]
[Article]  TAFIM - Technical Architecture Framework for Information Management [May 1997 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
themeInternet Access Platform
[Course]  Internet/intranet Security
[Presentation]  Deperimetrization or not ? [22 November 2007 - French]
[Presentation]  Internet Firewall Management [23 June 2002 - French]
[Presentation]  How to make one's Internet security [5 January 2002 - French]
[Presentation]  Integration of security into the company's Internet/intranet development [26 May 2000 - French]
[Presentation]  Facility management of one's Internet security [23 September 1999 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Bypassing Internet security gateways [19 March 1997 - French]
[Presentation]  Secured Internet Gateways [2 June 1994 - French]
[Presentation]  Choice criteria for an Internet security solution [April 1994 - French/English]
> Copyright © 2001, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 16:35:47 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants