CHAPTER 8Network and Server Defenses
Chapter 8 will cover technical anti-phishing defenses (software, hardware, and services) that can or should be deployed at the network level or server level in most organizations.
Creating a secure, trusted communications enclave where users and their devices can do their work is a requirement for good cybersecurity. Chapter 8 will cover many of the defenses necessary to secure a network against social engineering (where possible), phishing, and all cyberattacks. Many of these defenses should also be deployed on the server level and/or individual endpoint level (covered in Chapter 9, “Endpoint Defenses”) for a healthy defense-in-depth cyber defense plan. This chapter will cover super common network and server defenses as well as far less common ones.
Defining Network
For this chapter and book, what is a network? A network is any collection of communicating nodes. The simplest example of a network is two or more computers connected to each other using a common communication medium (e.g., wired or wireless). Networks can be very large, like the Internet or other global-sized networks. Networks can cover one or more cities (i.e., a metropolitan network). And networks can be small like inside your house or car.
Most of what this chapter discusses applies to organization-wide networks (e.g., local area networks, wide area networks, etc.), or perhaps even home networks to a smaller extent. This chapter does not apply to very short-distance networks ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access