CHAPTER 18Perimeter Security in the Real World

The following challenges provide you with contextual reference points for the concepts you will learn in Part IV. Because you have not yet read the chapters in Part IV, the challenges in this chapter are designed to introduce you to the local host scenarios you’ll face in the real world. In this chapter, you’ll learn to:

  • Understand the relevance of internet perimeter security
  • Use the NIST Cyber Security Framework to develop specific solutions for the security scenarios presented

Security Challenges

This chapter will jumpstart your thought processes for what you are about to learn in Part IV. Instead of simply trying to absorb all of the information you’re about to learn in these chapters, ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.