As a modern security administrator, it is critical to understand the differences, advantages, and disadvantages inherent in technologies implemented in a corporate network. This section will discuss very important technologies, such as the DMZ, NAT, virtualization, and cloud computing, and will cover the following topics:
- Remote Access
- Cloud Computing
Quite possibly, the most important security concern is at the network perimeter (the locus of most attacks), where the company intranet meets . . .
The content below this message is for members only.