Structured
Unstructured
Internal
External

It's covered in every training course I've taken so far on my way to CCSP.
CSVPN covers it, SECUR covers it, CSI covers it, I believe CSPFA covers it,
and CSIDS probably covers it.

Joshua covered the four remote-access types nicely...

Fred Reimer - CCNA

Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050

NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the named recipient(s).
If an addressing or transmission error has misdirected the email, please
notify the author by replying to this message. If you are not the named
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.


-----Original Message-----
From: Marko Milivojevic [mailto:[EMAIL PROTECTED] 
Sent: Sunday, August 24, 2003 8:29 PM
To: [EMAIL PROTECTED]
Subject: Re: SAFE and the Holy Hand Grenade of Antioch [7:74304]

> Yet when I go through the SAFE documentation, I find:
>      7 Axioms of types of targets (p. 5 of PDF)
>      3 Types of Expected Threats (p. 10)
>      3 separate validation services for remote user access (p. 30)
>     12 elements of the taxonomy of network attacks (p. 56), some of
>        which are actually host attacks.
> 
> No number that is four.

    Uhm, this is 4-items list... ;-)


Marko.
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74322&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to