First page Back Continue Last page Summary Graphic
Perimeter Defenses
Perimeter Defenses include firewalls and screening routers, as well as access control mechanisms, such as Secure Shell (ssh), Kerberos and S/Key one-time encryption algorithms. The goal of perimeter defenses is to keep the bad guys out. Disabling or limiting unneeded or dangerous services (NFS, NETBIOS, RPC, etc)
For network security, this would also include inter-host communications, and trust models.
Notes: