Firewalls


(1) LAN with no Internet access

(2) LAN with very restricted Internet access

All Internet access done by Proxy programs that are constrained

Some organizations have networks inside and outside the firewall

Firewall only as strong as weakest node

Irony -- 80% of security breaches are internal. Internal security more important than perimeter defense. Outside world seems scarier, but inside world more dangerous.