Download now Free registration required
Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, Intrusion Detection Systems (IDS) and Virtual Private Networks (VPN) are centralized solutions which rely mostly on the analyze of inbound network connections. This approach notably forgets the effects of a rogue station, whose communications cannot be easily controlled unless the administrators establish a global authentication policy using methods like 802.1x to control all network communications among each device.
- Format: PDF
- Size: 2881.8 KB