Top Posters
Since Sunday
d
6
M
5
a
5
o
5
m
4
J
4
M
4
s
4
s
4
a
4
g
4
c
4
New Topic  
Alek Hsiang Alek Hsiang
wrote...
Posts: 383
Rep: 1 0
5 years ago
The practice of funneling computer network traffic through certain points where it can be filtered and inspected for malware.  This is referred to as using:

▸ Planned redundancy

▸ Using choke points

▸ Network segmentation

▸ Reciprocity
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 131 times
1 Reply
Replies
Answer verified by a subject expert
jenniferagrethejenniferagrethe
wrote...
Posts: 369
5 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

Alek Hsiang Author
wrote...

5 years ago
this is exactly what I needed
wrote...

Yesterday
I appreciate what you did here, answered it right Smiling Face with Open Mouth
wrote...

2 hours ago
Thanks for your help!!
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1412 People Browsing
 110 Signed Up Today
Related Images
  
 608
  
 366
  
 326
Your Opinion
Who's your favorite biologist?
Votes: 608