Chapter 8. Perimeter Intrusion Prevention

Protecting a network perimeter used to be a simple thing: Stick a firewall on your Internet connection, lock down all of the unused ports, and monitor on a regular basis. Today the concept of the perimeter has expanded to encompass more than just the Internet edge. The perimeter now represents logical zones of trust that are created to protect against internal and external threats. Network borders have become fluid, while the need for secure access to data has increased dramatically. Defending the applications and services that provide this data is accomplished through perimeter defense controls such as firewalls and intrusion prevention systems (IPS).

Firewalls and intrusion prevention systems are a ...

Get Network Security Auditing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.