ZyWALL IDP 10 Quick Start Guide
1 Introduction to Intrusions
Refer to the following figure for the introduction.
Figure 1 Intrusions
Figure 1 represents a typical business network consisting of an employee LAN, a DMZ (DeMilitarized Zone) containing the company web, FTP, mail etc. servers, a firewall and/or NAT router connected to a broadband modem for Internet access.
Host-based intrusions are what most people call “virus attacks”. The goal of host-based intrusions is to infiltrate files on an individual computer or server (see 1 in Figure 1) in with the goal of accessing or destroying confidential information. To protect against host-based intrusions you need to install anti- virus software on your computer or/and install a device with anti-virus software such as the Prestige 662HW. Sources of host-based attacks are the Internet, telecommuting employees using VPN to access the company intranet, employees (inadvertently) using infected floppy disks, memory sticks, removable hard drives etc.