HostedDB - Dedicated UNIX Servers

index_24
Auerbach Publications © 2001 CRC Press LLC 08/01 from total assimilation can be measured. Firewalls, modems, routers, fil- ters, and even software such as browsers can provide a visible point of access to the Internet. As technology becomes more prevalent, the de- marcation between the Internet and private networks will begin to blur. Unfortunately, without proper foresight the allocation of security mea- sures and mitigation processes will not keep up with advances in infor- mation terrorism. If not properly planned and controlled, seemingly secure alternative routes into a fortification can negate all other protec- tion; a castle’s walls will be ineffective against an attack that does not come directly at them. James S. Tiller, CISSP, CCNA, CCDA, MCSE+1, is Managing Principal, Security Products, Lucent Technologies, in Tampa, Florida. He has over ten years of experience in network consulting, specializing in Internet and com- munications security. He is the author of A Technical Guide to IPSec Virtual Private Networks, Auerbach Publica- tions, 2001.