Network security is like the proverbial chain. It's only as strong as its weakest link. The organization's IT infrastructure is most secure when every security element works together and threats are contained at every point of entry. A detailed discussion of these systems is beyond the scope of the current book, but this section describes the broad aspects of security beyond the network devices to provide a holistic view to the reader.
Security beyond the network devices
Securing the network perimeter
Most of the attacks generally originated from outside the network perimeter. The network perimeter is always treated as the boundary between inside and outside networks. Therefore, it is very important to secure this...