Documente Academic
Documente Profesional
Documente Cultură
TYPE ES GES
Packet
•Efficient at processing packets •Incapable of filtering at the application layer
filtering
•Enables complex security policies through • Can be difficult to securely configure
firewall
filtering on protocol headers • Lacks features like user authentication. logging
•Vulnerable to spoofing attacks
• Provides privacy for data passing in out of • Protects circuits (network sessions)
Circuit rather than Individual packets
level gateway private network
• More efficient processing traffic than •Requires modification to network protocol stack
application level gateways • Incapable of content filtering
• Relatively Inexpensive
•Capable of blocking types of attacks that •can require high degree of skill to
State full exploit protocol vulnerabilities securely configure
inspection •Does not support authenticated connections
•Can operate with fewer open ports,
firewall
reducing attack surface •Not effective against exploits of stateless
protocols
•Capable of blocking many types of denial
of service attacks •High processing overhead
https://sites.google.com/a/unicesar.edu.co/fblanco/delitos-informaticos?tmpl=%2Fsystem%2Fapp%2Ftemplates%2Fprint%2F&showPrintDialog=1
https://www.ccit.org.co/wp-content/uploads/informe-tendencias-cibercrimen_compressed-3.pdf
https://www.delitosinformaticos.mx/que-es-un-delito-informatico/ciberdelitos-mas-comunes/ataques-de-denegacion-de-servicio/