Popular Posts

Mitigating Layer 2 Attacks



      Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements.
Access to switches is a convenient entry point for attackers who are intent on
illegally gaining access to a corporate network. With access to a switch, an attacker can
set up rogue access points and protocol analyzers, and launch all types of attacks from
within the network. Attackers can even spoof the MAC and IP addresses of critical
servers to do a great deal of damage.




 

Tags


Powered by WidgetsForFree

Featured Content

Our Partners

© 2010 Logical Network Security. All Rights Reserved Thesis WordPress Theme Converted into Blogger Template by Hack Tutors.info