ABSTRACT

The explosion of the commercial use of the Internet has

created specific business and technology demands for

products that could allow organizations to explore the

opportunities that arose without compromising their secur-

ity. Thousands of internal networks, with a high level of trust

for their owners, have been connected to a public and

loosely controlled network; this has opened those organiza-

tions to a series of new security problems.