ABSTRACT

The explosion of the commercial use of the Internet has created specific business and technology

demands for products that could allow organizations to explore the opportunities that arose without

compromising their security. Thousands of internal networks, with a high level of trust for their owners,

have been connected to a public and loosely controlled network; this has opened those organizations to a

series of new security problems.