O'Reilly logo

HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT by Steven Branigan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Result of Network Evolution

To protect their business assets, corporations usually deploy many of the following tools:

  • Firewalls to screen out unwanted traffic.

  • Virus scanners.

  • Web proxies to provide accessibility only to approved websites while preventing access to non-approved sites.

  • DMZs to provide secure ecommerce to the Internet at large while protecting the corporate network.

  • VPNs to provide secure remote access to corporate networks.

A typical deployment for a network is depicted in Figure 8-5. Note that two firewalls are used in this deployment in order to provide two levels of security, one for the DMZ systems behind the external firewall and even greater security for hosts behind the second firewall. The external firewall is not as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required