ABSTRACT
The explosion of the commercial use of the Internet has
created specific business and technology demands for
products that could allow organizations to explore the
opportunities that arose without compromising their secur-
ity. Thousands of internal networks, with a high level of trust
for their owners, have been connected to a public and
loosely controlled network; this has opened those organiza-
tions to a series of new security problems.