Network Security
- The first round of defense is often the network
- We can control what network traffic is allowed into our network
- Not all machines need to allow connections from the internet
- Often there are public and private resources in a network
- Public resources have a public IP and hostname
- Private resources do not
3 / 26