R

Public Servers

VPN and IPsec

Application Layer Attacks

Public Servers

Denial of Service Attacks: TCP SYN Floods, UDP Floods

Spoofed IP Addresses

VPN and IPsec

Denial of Service Attacks: TCP SYN Floods, UDP Floods

Spoofed IP Addresses

Remote Access

Password Attacks

Remote Access

Because of the complexity of network applications, access control must be extremely granular and flexible yet still provide strong security. Tight borders between outside and inside cannot be defined, because interactions are continuously taking place between the Enterprise Edge and

Enterprise Campus. The ease of use of the network applications and resources must be balanced against the security measures imposed on the network users.

NOTE Chapter 10, "Evaluating Security Solutions for the Network," covers security in the network in more detail.

Was this article helpful?

0 0

Post a comment