Network Security Week 11 And Week 12
12.1 List three design goals for a firewall. 12.2 List four techniques used by firewalls to control access and enforce a security policy. 12.3 What information is used by a typical packet filtering firewall? 12.4 What are some weaknesses of a packet filtering firewall? 12.5 What is the difference between a packet filtering firewall and […]
