CHAPTER 8Network and Server Defenses
Chapter 8 will cover technical anti-phishing defenses (software, hardware, and services) that can or should be deployed at the network level or server level in most organizations.
Creating a secure, trusted communications enclave where users and their devices can do their work is a requirement for good cybersecurity. Chapter 8 will cover many of the defenses necessary to secure a network against social engineering (where possible), phishing, and all cyberattacks. Many of these defenses should also be deployed on the server level and/or individual endpoint level (covered in Chapter 9, “Endpoint Defenses”) for a healthy defense-in-depth cyber defense plan. This chapter will cover super common network and server defenses as well as far less common ones.
Defining Network
For this chapter and book, what is a network? A network is any collection of communicating nodes. The simplest example of a network is two or more computers connected to each other using a common communication medium (e.g., wired or wireless). Networks can be very large, like the Internet or other global-sized networks. Networks can cover one or more cities (i.e., a metropolitan network). And networks can be small like inside your house or car.
Most of what this chapter discusses applies to organization-wide networks (e.g., local area networks, wide area networks, etc.), or perhaps even home networks to a smaller extent. This chapter does not apply to very short-distance networks ...
Get Fighting Phishing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.