Abstract
Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intrusion detection systems, firewalls, and honeypots. This chapter introduces these devices, their types, and the architectural considerations for their placement in the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). IDSes, Firewalls, and Honeypots. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_13
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books