• 3.4.1. Internet service protection
  • 3.4.2. Active outreach protection
  • 3.4.3. Micro-isolation Protection
  • Usage scenarios of cloud firewall




    Download 234,35 Kb.
    Pdf ko'rish
    bet9/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
    1   ...   5   6   7   8   9   10   11   12   13
    Bog'liq
    Research on firewall technology and its applicatio
    1-mavzu, public key print, 649 20.10.2020, UZLIKSIZ TA\'L.PEDAGOGIKASI UMKA, Информ.письмо по конференции ЮФ 23 дек 2022 (полное) (1), Микропроцессор КР580, ABTADV 5та Amaliyot MK bo\'yicha, 6-амал маш.угит сол, 2mavzu qurlish texnoligiyasidan, 1 Ma\'ruza Sanoat robotlari va mexatronika faniga kirish , 15-маъруза (3), kurs loyixa ЭРТМ, bakayeva, в конце они оба умрут, FAOLIYAT VA KIRITIVLIK QOBILIYATLARINI RIVOJLANISHI
    3.4. Usage scenarios of cloud firewall 
    Cloud firewall is a security product that supports network-
    wide traffic identification and unified policy control, and can 
    filter out potentially malicious network traffic. It is a 
    collective name for Internet border firewall, VPC border 
    firewall, and host border firewall, providing users with three 
    kinds of border protection and traffic visualization for Internet, 
    virtual network, and host. The cloud firewall is hosted in the 
    cloud, and there are three main usage scenarios. 
    3.4.1. Internet service protection 
    It controls access traffic to and from the Internet and 
    intercepts attacks and threats from the Internet, including 
    mining, malicious traffic and hacking. For example, if a 
    financial user has other types of business exposed to the 
    Internet in addition to HTTP business, the user needs to use 
    an intrusion detection module (IPS) for protection. 
    3.4.2. Active outreach protection 
    The active outreach behavior of cloud assets is detected and 
    analyzed to help users understand network traffic dynamics in 
    real time and implement protection. For example, a 
    government department user, in addition to focusing on 
    defense from the Internet to the business, also focuses on 
    active outreach to the business to determine which hosts are 
    already at risk and to block these abnormal behaviors in real 
    time to avoid potential risks. 
    3.4.3. Micro-isolation Protection 
    Access traffic between ECS servers in the intranet is 
    controlled so that different businesses can be safely isolated. 
    For example, an e-commerce customer, although all HTTP 
    services are protected by a Web application firewall, expects 
    security isolation of different services to enhance the overall 
    network control and avoid security threats to the entire 
    business on the cloud due to the existence of security risks in 
    one ECS. 

    Download 234,35 Kb.
    1   ...   5   6   7   8   9   10   11   12   13




    Download 234,35 Kb.
    Pdf ko'rish