【正文】
Chapter 34 Network security Introduction ? Routers forward packets from any source ? Bad guys can send in packets from outside ? How to avoid security breaches? Secure works and security policies ? Can39。t describe a work as secure in the abstract ? University may have different notion of security than military installation – Must define a security policy ? Many possibilities to consider: ? Data stored on servers ? Messages traversing LANs ? Internal or external access ? Read/write versus readonly access Components of security policy ? Describes items to be protected and rules for protection ? Must cover puter systems, LANs, interconnection devices, ... ? Development must include assessment of cost of protected information versus cost of protection Aspects of security ? Data accessibility contents accessible ? Data integrity conten