R

Public Servers

VPN and IPsec

Application Layer Attacks

Public Servers

Denial of Service Attacks: TCP SYN Floods, UDP Floods

Spoofed IP Addresses

VPN and IPsec

Denial of Service Attacks: TCP SYN Floods, UDP Floods

Spoofed IP Addresses

Remote Access

Password Attacks

Remote Access

Because of the complexity of network applications, access control must be extremely granular and flexible yet still provide strong security. Tight borders between outside and inside cannot be defined, because interactions are continuously taking place between the Enterprise Edge and

Enterprise Campus. The ease of use of the network applications and resources must be balanced against the security measures imposed on the network users.

NOTE Chapter 10, "Evaluating Security Solutions for the Network," covers security in the network in more detail.

Was this article helpful?

0 0
Project Management Made Easy

Project Management Made Easy

What you need to know about… Project Management Made Easy! Project management consists of more than just a large building project and can encompass small projects as well. No matter what the size of your project, you need to have some sort of project management. How you manage your project has everything to do with its outcome.

Get My Free Ebook


Post a comment