Chapter 5. Overview of Security Technologies
“We can’t help everyone, but everyone can help someone.”
—Ronald Reagan
This chapter discusses the use of technologies that have evolved to support and enhance network security. Many of these technologies are used today without the user understanding when or where they operate. After reading this chapter, you will understand the benefits of these technologies, where they operate, and some of the operational risks associated with them. By the end of this chapter, you should know and be able to explain the following:
• How you can employ packet filtering to reduce threats to a network
• Understand precisely what stateful packet inspection is, and why its important for firewalls to use this technique ...
Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.