Firewalls
(1) LAN with no Internet access
(2) LAN with very restricted Internet access
All Internet access done by Proxy programs that are constrained
Some organizations have networks inside and outside the firewall
Firewall only as strong as weakest node
Irony -- 80% of security breaches are internal. Internal security
more important than perimeter defense. Outside world seems scarier,
but inside world more dangerous.