Structured Unstructured Internal External It's covered in every training course I've taken so far on my way to CCSP. CSVPN covers it, SECUR covers it, CSI covers it, I believe CSPFA covers it, and CSIDS probably covers it.
Joshua covered the four remote-access types nicely... Fred Reimer - CCNA Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338 Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050 NOTICE; This email contains confidential or proprietary information which may be legally privileged. It is intended only for the named recipient(s). If an addressing or transmission error has misdirected the email, please notify the author by replying to this message. If you are not the named recipient, you are not authorized to use, disclose, distribute, copy, print or rely on this email, and should immediately delete it from your computer. -----Original Message----- From: Marko Milivojevic [mailto:[EMAIL PROTECTED] Sent: Sunday, August 24, 2003 8:29 PM To: [EMAIL PROTECTED] Subject: Re: SAFE and the Holy Hand Grenade of Antioch [7:74304] > Yet when I go through the SAFE documentation, I find: > 7 Axioms of types of targets (p. 5 of PDF) > 3 Types of Expected Threats (p. 10) > 3 separate validation services for remote user access (p. 30) > 12 elements of the taxonomy of network attacks (p. 56), some of > which are actually host attacks. > > No number that is four. Uhm, this is 4-items list... ;-) Marko. **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=74322&t=74304 -------------------------------------------------- **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

