Privacy and Authentication Technology

Publisher Summary This chapter offers an overview of ways to address firewall privacy and authentication in a comprehensive fashion, outlining the key building blocks of a firewall privacy and authentication implementation and offering detailed guidance for each of these areas. The need to augment network security mechanisms with firewall privacy and authentication solutions has never been more vital. Traditional perimeter-oriented technologies are only part of a complete security picture. In spite of a range of security technologies being deployed, devastating thefts of sensitive data continue to occur. To address these threats, many organizations are looking to deploy firewall privacy and authentication solutions, which ensure the security of data inside the enterprise. In large part, this is because security efforts have mainly been focused on network security rather than firewall privacy and authentication. A comprehensive firewall privacy and authentication solution must address security across the whole enterprise. To achieve firewall privacy and authentication, it is important to think about the security of applications, databases, and the infrastructure that supports them as a whole.

[1]  John R. Vacca,et al.  Satellite Encryption , 1999 .