@@ -16,14 +16,22 @@ understand that writing software that is not vulnerable to being
1616hacked is an important part of the overall security landscape. It is
1717also a broad topic, starting with questions about the programming
1818language you use (e.g., memory-safe languages like Rust are less
19- susceptible than, say, C). Such topics are outside the scope of this
20- book, where we instead take a network-centric view, and ask: *"What can
21- we do in the network to either minimize opportunities for malware to
22- exploit vulnerable software, or to mitigate the impact of such an
23- exploit succeeding." * Firewalls, and more generally *security
24- appliances *, are part of the answer. They are devices placed at
25- strategic points throughout the network that identify and respond to
26- malicious traffic.
19+ susceptible than, say, C), and also including a variety of OS problems
20+ (e.g., how to efficiently enforce isolation between processes). Such
21+ topics are outside the scope of this book, where we instead take a
22+ network-centric view, and ask: *"What can we do in the network to
23+ either minimize opportunities for malware to exploit vulnerable
24+ software, or to mitigate the impact when such exploits succeed." *
25+ Firewalls, and more generally *security appliances *, are part of the
26+ answer. They are devices placed at strategic points throughout the
27+ network that identify and respond to malicious traffic.
28+
29+ The other big-picture takeaway is that firewalls and other security
30+ appliances illustrate the principle of defense in depth introduced in
31+ Chapter 2. It would be ideal for all the software we run to be
32+ bullet-proof, but for those times it isn't—e.g., when a new bug is
33+ discovered—we need a second line of defense. Network appliances play
34+ that role.
2735
28369.1 Basic Principles of Firewalls
2937-----------------------------------
@@ -521,12 +529,12 @@ learning algorithms to classify traffic as "normal" or
521529have their respective strengths and weaknesses, it is common to find
522530both approaches used in modern IDS/IPS systems.
523531
524- The proliferation of security appliances brings us back to one the
525- security principles discussed in Chapter 2: defense in depth. For
526- example, if we had a perfect firewall, we might not require an IDS or
527- IPS. However, knowing that firewalls will never block all forms of
528- malicious traffic leads to the conclusion that an IDS/IPS is worth
529- having as a second line of defense.
532+ The proliferation of security appliances again highlights the
533+ principle of defense in depth. For example, if we had a perfect
534+ firewall, we might not require an IDS or IPS. However, knowing that
535+ firewalls will never block all forms of malicious traffic leads to the
536+ conclusion that an IDS/IPS is worth having as a second line of
537+ defense.
530538
5315399.4.2 DoS Mitigation
532540~~~~~~~~~~~~~~~~~~~~~~~~~~~
0 commit comments