In this chapter, you will learn about:
• Firewalls and firewall subversion
• Intrusion detection systems—host-based and network-based
• Intrusion protection systems—host-based and network-based
• Defense in depth and in breadth
• Common network attacks
Almost since the creation of the ARPANET, there has been malware around to infect it. One of the very first, if not the very first, was an experimental program written at BBN. Technically, the term malware may not be the most appropriate here because all it did was display ...