•Proxy services. Adequate proxy applications should be in place to provide explicit user authentication to sensitive services, applications, and data.• Filtering. Strong filtering techniques should be designed to deny all services thatare not explicitly permitted. In other words, the firewall should specify onlythose services the user is permitted to access, rather than specifying the services that are denied.
đang được dịch, vui lòng đợi..
