Security

Part II: Routing, the Hole in the Wall

Download Now Free registration required

Executive Summary

Routing can be tricky. If one knows where data is going, one is half way to resolving a large number of application problems. But understanding where data is being routed to and from is crucial in the security arena. Incorrect routing can result in security measures being bypassed or reduced to allow for badly configured networks. This paper investigates some of the common errors that occur and explain why they are bad practice and how they might be mitigated.

  • Format: PDF
  • Size: 1429.9 KB