Stories of compromised servers and data theft fill today's news. It isn't difficult for someone who has read an informative blog post to access a system via a misconfigured service, take advantage of ...
This chapter looks at the management of firewalls. From the perspective of the small office/home user, the firewall is a single device that protects the home network from malicious traffic—it keeps ...
Two research studies have shown there is a direct correlation between firewall rule set complexity and the likelihood of configuration errors. One study shows most firewalls are badly configured and ...