Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part I. Fundamentals of Network Security > Chapter 3. Building a Security Strat...

Chapter 3. Building a Security Strategy


This chapter covers the following subjects:

Securing borderless networks

Controlling and containing data loss


In today’s networks, with so many access methods, including virtual private networks (VPN), remote employees, partner intranets, public access, and so on), we really need to consider all these types of access while building a security strategy. One term used often is borderless networks, which suggests the network does not simply start at one location and end at another location, but instead provides access without physical borders. As the world looks for uninterrupted and ubiquitous access, this concept shows how one person’s dream can be another person’s nightmare.

This chapter examines a high-level strategy for securing this type of “borderless” network.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint