Showing posts from February, 2021
Traffic Flow Security

Traffic Flow Security

0

Traffic Flow Security So far, we have looked at controls that cover the most common network threats: cryptography for eavesdropping, authentication methods for impersonation, intrusion detection systems for attacks in progress, architecture for structural f…

Continue Reading
Honeypots

Honeypots

0

Honeypots How do you catch a mouse? You set a trap with bait (food the mouse finds attractive) and catch the mouse after it is lured into the trap. You can catch a computer attacker the same way. You put up a honeypot for several reasons: ·          t…

Continue Reading
Alarms and Alerts

Alarms and Alerts

0

Alarms and Alerts The logical view of network protection looks like   Figure 7, in which both a router and a firewall provide layers of protection for the internal network. Now let us add one more layer to this defense. Figure 7   Layered Network Protec…

Continue Reading
Load More No results found