First page Back Continue Last page Summary Graphic

Perimeter Defenses

  • Perimeter Defenses include firewalls and screening routers, as well as access control mechanisms, such as Secure Shell (ssh), Kerberos and S/Key one-time encryption algorithms. The goal of perimeter defenses is to keep the bad guys out. Disabling or limiting unneeded or dangerous services (NFS, NETBIOS, RPC, etc)
  • For network security, this would also include inter-host communications, and trust models.

    Notes: