Security Architecture and Engineering

Network identity

E.g If you are on Columbia University network, when you go online to read research journal, you don't have to pay because you are identified as part of Columbia U community based on your Network.

  • A machine has an IP address.
  • A compromised application can use this address to exploit address-based access control.
  • E.g A hacker compromised an experimental firewall, and through firewall, he compromised an FTP server and launched attacks via FTP server it confused intrusion detection system..