5.7. Topologies for Securing Networks
The way that a network is laid out can greatly influence the vulnerability of that network. For a firewall to be effective, you must ensure that an attacker cannot simply “walk around” the barrier presented by the firewall. In other words, the firewall must be the only entry point to your network. Many breaches in corporate networks occur because someone connects a laptop that has been infected with a virus while connected to a home Internet connection. Allowing systems on the intranet to make modem connections has similar potential for disaster.
You can employ a number of possible layouts to make a network more secure, or more flexible. However flexibility and security are mutually incompatible, and you ...
Get Sun Certified Enterprise Architect for J2EE™ Technology Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.