Defending the Perimeter from Cyber Attacks