Chapter 10. Threat Defense
Topics covered in this chapter include
■ Network Address Translation (NAT)
■ Packet Filtering Techniques and Inherent Problems with Industrial Communication Protocols
■ Application Visibility and Control
■ IDS/IPS Technology
■ Malicious Domain Protection (DNS-Based Security)
■ Use Case Examples of Centralized and Distributed VNF Placement
The previous chapter focused on technologies to identify endpoints, provide adaptable authentication mechanisms to ensure that an endpoint is what it claims to be, and then provide the appropriate level of access privileges based on its identity. That technology is engaged before the endpoint ...
Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.