1. Network Border Firewall:
    1. Firewalls usually control access between security zones, and are usually placed at the edge or boundary of a network.
    2. There are three common Security Zones:
      1. Inside:
        1. From an organization's point of view, the area within or behind the firewall can be trusted. This is referred to as the "inside" security zone. The "inside" security zone is trusted, and must be protected from the "outside" security zone.
      2. Outside:
        1. From the firewall's point of view, this refers to all systems that do not belong to the trusted organization.
      3. DMZ:
        1. A network area containing a small number of systems (typically servers) who serve clients both in the trusted security zone as well as outside it. These machines are owned and controlled by the trusted organization, but are frequently accessed by systems outside of the organization's control.
    3. Traffic between these Security Zones follows these flows:
      1. Inside Zone
        1. >>> DMZ
          1. Usually Permit
        2. >>> Outside
          1. Usually Permit
      2. Outside
        1. >>> Inside
          1. Implicit Deny
        2. >>> DMZ
          1. Selective Permit
      3. DMZ
        1. >>> Inside
          1. Implicit Deny
        2. >>> Outside
          1. Selective Permit
  2. Special Purpose Networks:
    1. Extranets:
      1. Special intranet segments that are accessible by outside parties.
      2. Example:
        1. Guest Login over VPN
    2. Honey Nets:
      1. Decoy networks designed to attract attackers, that appear to be lucrative targets but in reality contain no sensitive information and are isolated from other network systems.
      2. Security teams use honey nets to identify potential attackers, study their behavior, and block them from affecting legitimate systems.
    3. Ad Hoc Networks:
      1. Temporary networks created over a short range between a small number of devices.
      2. Ad hoc networks may present a security risk if they are interconnected with other networks that lack strong security controls.
      3. Example:
        1. An unencrypted Ad Hoc WAP connected to a secure network can act as a backdoor or allow eavesdropping.