Chapter 4. Network Security Technologies

This chapter covers the following topics:

The Difficulties of Secure Networking

Security Technologies

Emerging Security Technologies

Technology . . . is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other. —C. P. Snow, New York Times, March 15, 1971

L0pht, making the theoretical practical since 1992. —L0pht Heavy Industries

Chapter 3 discussed secure networking threats. This chapter focuses on the broad technologies that can mitigate those threats. The technologies discussed here can be considered foundation technologies for network security and include firewalls, intrusion detection systems (IDS), identity systems, and encryption.

This chapter follows ...

Get Network Security Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.