CHAPTER 18
Perimeter Security in the Real World
The following challenges provide you with contextual reference points for the concepts you will learn in Part IV. Because you have not yet read the chapters in Part IV, the challenges in this chapter are designed to introduce you to the local host scenarios you’ll face in the real world. In this chapter, you’ll learn to:
- Understand the relevance of internet perimeter security
- Use the NIST Cyber Security Framework to develop specific solutions for the security scenarios presented
Security Challenges
This chapter will jumpstart your thought processes for what you are about to learn in Part IV. Instead of simply trying to absorb all of the information you’re about to learn in these chapters, you’ll begin here by gaining a better understanding of the real-world relevance of that information.
In Chapter 25, you will return to these scenarios and apply what you have learned in Chapters 19 through 24. You will...