Summary

In this chapter, we covered the various security mechanisms typically deployed to protect the enterprise network from threats. We also presented methods to secure the common network services e-mail, DNS, file transfer, and Internet access to avoid costly implementation mistakes. In the securing websites section, we covered leveraging a layered security approach to ensure coverage with a focus on secure coding and database encryption.

Network segmentation was presented as a method to protect internal critical assets from both internal and external threats. The flexibility of trust-based security architecture was presented for securing both internal and external access to the enterprise assets. We explored the three most common network areas, ...

Get Enterprise Security: A Data-Centric Approach to Securing the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.