Firewall: Hardware and/or software to prevent unauthorized access to private networks
Screening technologies
Packet filtering
Stateful inspection
Network address translation (NAT)
Application proxy filtering
Intrusion detection systems: Monitor vulnerable points on networks to detect and deter intruders
Examines events as they are happening to discover attacks in progress
Scans network to find patterns indicative of attacks