The Result of Network Evolution

To protect their business assets, corporations usually deploy many of the following tools:

  • Firewalls to screen out unwanted traffic.

  • Virus scanners.

  • Web proxies to provide accessibility only to approved websites while preventing access to non-approved sites.

  • DMZs to provide secure ecommerce to the Internet at large while protecting the corporate network.

  • VPNs to provide secure remote access to corporate networks.

A typical deployment for a network is depicted in Figure 8-5. Note that two firewalls are used in this deployment in order to provide two levels of security, one for the DMZ systems behind the external firewall and even greater security for hosts behind the second firewall. The external firewall is not as ...

Get HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.