Introduction


Welcome, and thank you for considering the second edition of Inside Network Perimeter Security. This book is a unique volume because it has a consistent phrasing and style, yet it consolidates the experience of more than a dozen information security professionals working together as a team of writers and reviewers. Our goal was to create a practical guide for designing, deploying, and maintaining a real-world network security perimeter. This is a crucial topic because robust network defenses form the foundation of a reliable and trustworthy computing infrastructure.

As Richard Clarke, the former U.S. cyber-security czar, pointed out during a keynote address at a SANS Institute conference: "The perimeter is crumbling. Wireless technologies, worms, and our gadget mentality are the reason." Given the porous nature of the modern perimeter, protecting the network is not an easy task; it requires that you get to know different types of technologies and understand how they relate to each other. This is why we discuss key perimeter security components, such as firewalls, VPNs, routers, as well as intrusion detection and prevention systems. We also explain how to integrate these devices with each other to form a unified whole. There is no single gadget that can protect our networks against all threats, which is why we focus on layered security architectures. This concept of defense in depth is present throughout the book, and we believe it holds a key to the practical use of the perimeter security techniques discussed here.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net