Showing posts from February, 2021
Traffic Flow Security So far, we have looked at controls that cover the most common network threats: cryptography for eavesdropping, authentication methods for impersonation, intrusion detection systems for attacks in progress, architecture for structural f…
Anic_an_engineer
Continue Reading
Honeypots How do you catch a mouse? You set a trap with bait (food the mouse finds attractive) and catch the mouse after it is lured into the trap. You can catch a computer attacker the same way. You put up a honeypot for several reasons: · t…
Anic_an_engineer
Continue Reading
Alarms and Alerts The logical view of network protection looks like Figure 7, in which both a router and a firewall provide layers of protection for the internal network. Now let us add one more layer to this defense. Figure 7 Layered Network Protec…
Anic_an_engineer
Continue Reading