Guest_imported
New member
- Jan 1, 1970
- 0
I have been told that anyone, if they know the rigth information, can
build a PVC into your network. Being "told" this is generally not good
enough to take to management in your risk analysis process when
asking for monies to buy VPN solutions. Can anyone point me in
a good direction which points out the specific vulnerabilities?
Even better would be real life examples, instead of theory, but
that is probably asking too much.
Thanks
Sty
build a PVC into your network. Being "told" this is generally not good
enough to take to management in your risk analysis process when
asking for monies to buy VPN solutions. Can anyone point me in
a good direction which points out the specific vulnerabilities?
Even better would be real life examples, instead of theory, but
that is probably asking too much.
Thanks
Sty