O'Reilly logo

Network Security Architectures by Sean Convery

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Device Hardening

 

At the stumbling of a horse, the fall of a tile, the slightest pin prick, let us promptly chew on this: Well, what if it were death itself? And thereupon let us stiffen and fortify ourselves.

 
 --Michel de Montaigne, That to Philosophize Is to Learn to Die, 1580
 

There is no security for any of us unless there is security for all.

 
 --Howard Koch, Mission to Moscow, 1943

This chapter defines basic hardening strategies for the most common elements of a security system. Entire books have been written in detail about hardening each of these elements. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required