Minimal Prevention of Attacks
Authentication and Encryption should be used
TCP/IP implementation should be addressed
Current Methods
Firewalls/Packet Filtering
External Logging
Disable non-essential or buggy services
Install host checks
Previous slide
Next slide
Back to first slide
View graphic version