Security Challenges In The Face Of Convergence - PBS
Example PAD Attack cont. 2. Attacker forges sender IP and sequence number and sends RESET packets.
Example PAD Attack cont. 3. Importer drops its connection to the legitimate sender. 4. Attacker sends Importer custom PAD.
Reality • Firewall, maybe • Con
Reducing The Risks • Vendor “en
IT should keep in mind • Impact o
B’cast should keep in mind • An
“Encourage” Vendors • Support
Policies and Procedures • No Web
Anti-Virus In Depth • You need it
Anti-Virus In Depth • Check syste
CNET Labs (April 7, 2006) iTunes 6
Summary • IT is fueling productiv
Questions? firstname.lastname@example.org sgebha