organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. NETWORK SECURITY TOOLS
that collectively form a barrier between two networks. CONCLUSION Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices. REFERENCES 1 The New Lexicon Webster's Encyclopedic Dictionary of the English Language. New York: Lexicon. 2 R.T. Morris, 1985. A Weakness in the 4.2BSD Unix TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey. 3 S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989. 4 Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, ``Address Allocation for Private Internets.'' RFC 1918. 5 J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244. 6 M. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.'' USENET <sci.crypt> Frequently Asked Questions File.