ABSTRACT

Because the opening of a private network to potential intrusion via the Internet results from the connection of that network to the Internet, the most appropriate point to begin an examination of security methods is by

focusing upon that connection. Exhibit 1 illustrates the most common method used to connect a private network to the public Internet.