ABSTRACT

Although one knows how and what is required to set up perimeter security and the management tactics for regulating an environment, there are a number of limitations that need to be addressed but are outside the scope of this book. These additional topics include:

Virus protection and scanning

Fault tolerance and load balancing

Reporting and management

Encryption acceleration

Public key infrastructure

Authentication

Intrusion detection

Backup and recovery

Each of these topics on its own is a lengthy discussion; but nonetheless, each must be addressed to fulfill the requirements of a well-founded security front. Once the initial constructs of an organization’s perimeter security have been put in place, time should be set aside to investigate options to integrate the above items into the corporate security model. These items are discussed in no particular order because each organization will have varied requirements and priorities.