Network and System Planning - How to Reduce Risk on a Comprimised System
This paper is going to highlight the Code Red Worm as a specific example of an attack. It will demonstrate how a network can be set up to help limit exposure to it and other similar attacks. It will also look at how a network can be designed to reduce the chance of it being infected, and then go a...