Page 262

The University of SydneyPage 9Network Security ControlsFirewalls–Packet Filters–Stateful Packet Filters–Application proxies–Diodes–Firewall on end-pointsIntrusion Detection / Prevention Systems–Network based / host based–Signature based–Heuristics based / protocol anomaly based–Stealth modeData-Leakage Protection systems–Network based / host basedContent scanning/Anti-Virus/Spyware Control systems–Network based / host basedSecure e-mail Systems