У нас вы можете посмотреть бесплатно The Gatekeeper’s Map: Securing the Perimeter through Strategic Routing или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This lecture explores the critical intersection of network architecture and security, focusing on how data flow control defines a network's defensive posture. We begin by examining Autonomous Systems (AS) and how their boundaries serve as the first line of defense against external threats. Students will learn to distinguish between the rigid security of Static Routes—ideal for locked-down, predictable paths—and the catch-all utility of Default Routes, which can become a "highway to the unknown" if not properly managed. The lecture culminates in a security-focused audit of the Routing Information Protocol (RIP). We will analyze the inherent vulnerabilities of "routing by rumor," the risks of unauthorized advertisements (route injection), and the essential hardening techniques—such as MD5 authentication and passive interfaces—required to keep internal network maps out of the hands of attackers.