@@ -11,6 +11,20 @@ help you if your machine has unpatched vulnerabilities. So other
1111approaches are often used to keep out various forms of potentially
1212harmful traffic. Firewalls are one of the most common ways to do this.
1313
14+ To provide a little more context for this chapter, it is helpful to
15+ understand that writing software that is not vulnerable to being
16+ hacked is an important part of the overall security landscape. It is
17+ also a broad topic, starting with questions about the programming
18+ language you use (e.g., memory-safe languages like Rust are less
19+ susceptible than, say, C). Such topics are outside the scope of this
20+ book, where we instead take a network-centric view, and ask: *"What can
21+ we do in the network to either minimize opportunities for malware to
22+ exploit vulnerable software, or to mitigate the impact of such an
23+ exploit succeeding." * Firewalls, and more generally *security
24+ appliances *, are part of the answer. They are devices placed at
25+ strategic points throughout the network that identify and respond to
26+ malicious traffic.
27+
14289.1 Basic Principles of Firewalls
1529-----------------------------------
1630
@@ -426,12 +440,11 @@ we recommend our companion book on software-defined networks.
4264409.4 Security Appliances
427441------------------------------
428442
429- Firewalls are often placed inside a larger category of *security
430- appliances *—devices placed at some strategic point in the network to
431- perform a security function. Such appliances generally watch for and
432- respond to unwanted traffic, where the main challenge is how to
433- distinguish between good and bad traffic. This section looks at two
434- examples.
443+ As introduced at the beginning of this chapter, *security appliances *
444+ are a generalization of firewalls. Such appliances are placed
445+ throughout the network, watching for and responding to unwanted
446+ traffic. The main challenge they face is how to distinguish between
447+ good and bad traffic. This section looks at two examples.
435448
4364499.4.1 Intrusion Detection and Prevention
437450~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0 commit comments