The Spoofing Spoofers
Thursday, February 9, 2012
What are two tools used in the spoofing attack?
Filtering at the Router
- Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense.
Encryption and Authentication
- Implementing encryption and authentication will also reduce spoofing threats.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment