Cyber Security Expo
 
Perimeter Router Security by Aditya Sood on 08/12/05

When one connect its enterprise network to internet, one is connecting its network to the thousands of network that are unknown thus giving millions of people an opportunity to access your assets. As such it leads to information sharing as the assets are being used by various people in the different organizations and places.

This Paper describes the Technologies that are used to minimize the threat of potential intruders to the enterprise and its assets.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.