O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identify, Specify, or Describe Good Host- and Network-Based Security Fundamentals

In general, this means understanding the capabilities and limitations of security devices, such as screening routers, firewalls, and so forth, and knowing how to implement appropriate security controls that are neither too open nor too restrictive. The key difference between host- and network-based fundamentals is where the boundary between “inside” and “outside” or “self” and “other” is drawn. For hosts, it's on a per-system basis; for networks, it occurs at some kind of boundary access point and/or device.

In particular, this concept applies specifically to various kinds of IDS implementations, which may be either host- or network-based. The characteristics of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required