Differences between revisions 5 and 6
Revision 5 as of 2008-05-24 08:41:43
Size: 252
Editor: MKCXI
Comment:
Revision 6 as of 2008-12-28 20:15:24
Size: 252
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 4: Line 4:
[[Navigation(slides)]] <<Navigation(slides)>>
Line 6: Line 6:
[[Include(Castle,,to="^----$")]] <<Include(Castle,,to="^----$")>>

"Our Networks are Castles"

attachment:castle-softedges.png

This is the traditional misconception of network perimeter security. Default assumption is that there is only a single point of entry guarded by firewall and possibly IDS.