A.12 Chapter 11: TCP/IP Networks -
On Ethernet networks, use switches to isolate traffic. -
Consider using low-level encryption mechanisms in enterprise networks, or to "tunnel" through external networks. -
Do not depend on IP addresses or DNS information for authentication. -
Do not depend on header information in news articles or email as they can be forged. |