Thursday, February 9, 2012

What are two tools used in the spoofing attack?

Filtering at the Router - Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense.

Encryption and Authentication - Implementing encryption and authentication will also reduce spoofing threats.

No comments:

Post a Comment