Chapter 4. Network Security Technologies
This chapter covers the following topics:
Technology . . . is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other. —C. P. Snow, New York Times, March 15, 1971
L0pht, making the theoretical practical since 1992. —L0pht Heavy Industries
Chapter 3 discussed secure networking threats. This chapter focuses on the broad technologies that can mitigate those threats. The technologies discussed here can be considered foundation technologies for network security and include firewalls, intrusion detection systems (IDS), identity systems, and encryption.
This chapter follows ...