Differences between revisions 2 and 3
Revision 2 as of 2008-05-24 07:16:38
Size: 442
Editor: MKDCCCXVI
Comment:
Revision 3 as of 2008-12-28 20:16:28
Size: 442
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
[[Include(^Obscurity Through Security/[0-9].*,,editlink)]] <<Include(^Obscurity Through Security/[0-9].*,,editlink)>>

  • image.png

Image by courtesy of Protos Protocol Genome Project.

"Our Networks are Castles"

attachment:castle-softedges.png

This is the traditional misconception of network perimeter security. Default assumption is that there is only a single point of entry guarded by firewall and possibly IDS.

Assumption 1





"Firewalls block"


Assumption 2




"Lets add L7 intelligence"


So Many Protocols

attachment:image.png

Assumption 3




"That won't happen, we have antivirus!"


Lets Have Standards!

  • image.png


Title
Obscurity Through Security
Author
Jani Kenttälä


CategorySlideShow