- Tech know how online

perimeter security

Perimeter security concerns the security at the transition between a private network or corporate network and a public network such as the Internet. It is implemented by perimeter firewalls, which provide initial strategic protection against attacks.

Perimeter security is based on the fact that the organization and company have protected themselves against access to transmitted data through firewalls and virtual private networks( VPN). Perimeter firewalls control traffic between private and public networks such as the Internet and shield the private network from public networks. They control communications and filter out those who can access the Internet from the enterprise and use its services. Likewise, they control the users who want to access the corporate network. Perimeter firewalls prevent data packets with dangerous content from reaching the central servers.

Perimeter firewalls form a first line of defense to protect one's network against external attacks against viruses, worms, Trojans, hackers and other attacks. In addition to perimeter firewalls, there are other deep levels of protection mechanisms such as virus scanners and antivirus software, as well as web filters. For perimeter security, certain policies are defined to protect the corporate network against the potential threats.

Virtual private networks (VPNs) can also make a decisive contribution to perimeter security. VPNs are self-contained, logical networks that operate at different layers of the OSI reference model and are established for specific user groups. They operate at the lower layers and use tunneling for IP data traffic. The data integrity of the transported data is ensured by Message Authentication Codes( MAC).

Englisch: perimeter security
Updated at: 13.07.2019
#Words: 254
Links: security, network, corporate network (CN), Internet, fact
Translations: DE

All rights reserved DATACOM Buchverlag GmbH © 2024