Network Security: An MPE/iX Overview
page 217/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Methods of Defending a Network (cont)
– Burglar alarms
• Traps set on specific networked objects that go off if accessed
– Honey pots
• Dummy objects used to attract attacks. Range from single devices
to whole sub networks.
– Vulnerability scanners
• Tools that scan a network periodically for holes/open
gateways/misconfigured routers
• Limited in scope because of potential damage to the network
– Cryptography
• Has potential, but complexity limits its use to local sites.