A.12 Chapter 11: TCP/IP Networks
On Ethernet networks, use
switches to isolate traffic.
Consider using low-level encryption mechanisms in enterprise
networks, or to "tunnel" through
external networks.
Do not depend on IP addresses or DNS information for authentication.
Do not depend on header information in news articles or email as they
can be forged.
|
| |
|