Skip to main content

Securing Network Traffic

  • Chapter
Book cover Enterprise Mac Security
  • 527 Accesses

Abstract

Infiltration is a very real problem for network administrators, one that can lead to confidential data being leaked outside of your controlled environment. Every day, new attacks are developed that try to breach a network’s security perimeter. Building a secure network requires that a number of key software and hardware components are implemented and configured correctly. But securing a network is not just about acquiring the right network hardware to block unwanted traffic. What is more important is understanding how a network works, how Internet traffic is managed, how information flows within that network, and what services need to be secured that control the traffic. One cannot fully secure what one does not understand.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Charles Edge, William Barker, Beau Hunter, and Gene Sullivan

About this chapter

Cite this chapter

Edge, C., Barker, W., Hunter, B., Sullivan, G. (2010). Securing Network Traffic. In: Enterprise Mac Security. Apress. https://doi.org/10.1007/978-1-4302-2731-1_10

Download citation

Publish with us

Policies and ethics