The primary objective of this book is to provide you with the following:
The key mitigation technique or methodology used in this book is a structured approach to security called defense in depth. Defense in depth is a method using several layers of network and host defenses to protect your infrastructure. These security layers are deployed using ASDM and the ASA/PIX Security Appliance. However, because a security appliance alone can't protect against all network attacks, CSA host intrusion prevention software is recommended as a mandatory security deployment. CSA is capable of stopping any attacks launched against a Microsoft Windows (and some Solaris and Linux) host or server environment connected to the Internet. |