Security Engineering Lecture 7: Network Security

Описание к видео Security Engineering Lecture 7: Network Security

Sam discusses how communications protocols can be subverted to cause harm in systems, along with how to protect systems connected on a fabric like the internet where actors may have mutual distrust: do you place all of your protections at the boundary (perimiterisation), or lock down each device to a precise configuration to stop them from being attacked in the first place (deperimeterisation)?

Комментарии

Информация по комментариям в разработке