Differences between revisions 3 and 4
Revision 3 as of 2008-05-15 08:36:31
Size: 129
Editor: addr-213-139-163-39
Comment:
Revision 4 as of 2008-12-28 20:15:44
Size: 129
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
[[Navigation(slides)]] <<Navigation(slides)>>
Line 4: Line 4:
[[Include(Castle,,to="^----$")]] <<Include(Castle,,to="^----$")>>

"Our Networks are Castles"

attachment:castle-softedges.png

This is the traditional misconception of network perimeter security. Default assumption is that there is only a single point of entry guarded by firewall and possibly IDS.