CHAPTER 21Protecting the Perimeter

The second level you need to secure is the inner perimeter, where the private network meets the Internet. What defines a perimeter is the boundary where you have control, versus where you don’t have control. The perimeter is where your private network touches those individuals and companies with which you want to interact. In this chapter, you’ll learn to:

  • Implement firewalls and other intrusion-prevention devices and structures
  • Describe common enterprise-network structures, including intranets, extranets, DMZs, and honeypots
  • Describe the purpose and limitations of firewalls
  • Describe the use of honeypots as an intrusion-prevention technique
  • Understand the role of DMZs (demilitarized zones) in cybersecurity ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.