Network Security

  • The first round of defense is often the network
  • We can control what network traffic is allowed into our network
  • Not all machines need to allow connections from the internet
  • Often there are public and private resources in a network
  • Public resources have a public IP and hostname
  • Private resources do not

3 / 26