When one connect its enterprise network to internet, one is connecting its network to the thousands of network that are unknown thus giving millions of people an opportunity to access your assets. As such it leads to information sharing as the assets are being used by various people in the different organizations and places.
This Paper describes the Technologies that are used to minimize the threat of potential intruders to the enterprise and its assets.
This document is in PDF format. To view it click here.