A host-based boundary protection mechanism is, for example, a host based firewall. Host-based boundary protection mechanisms are employed on devices to protect the asset where the data resides and to inspect data that has been decrypted. Host based firewalls also allow for finer granularity when determining which ports, protocols, and services need to be enabled on a system by system bases. Without a host based protection mechanism, the DNS system may not have adequate protection against attacks that may not be configurable at the perimeter firewall.
|