Chapter 8. Perimeter Intrusion Prevention
Protecting a network perimeter used to be a simple thing: Stick a firewall on your Internet connection, lock down all of the unused ports, and monitor on a regular basis. Today the concept of the perimeter has expanded to encompass more than just the Internet edge. The perimeter now represents logical zones of trust that are created to protect against internal and external threats. Network borders have become fluid, while the need for secure access to data has increased dramatically. Defending the applications and services that provide this data is accomplished through perimeter defense controls such as firewalls and intrusion prevention systems (IPS).
Firewalls and intrusion prevention systems are a ...
Get Network Security Auditing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.