----- ______ ______ |___| -----| |- FW- | |- IDS- | | _______________|_________|______ ( INTERNET )
----- | | |___| -----| | . | . ------- (mail server, (clients) | DMZ | web server, ------- application server)
I have this network structure and I need your comments on its network vulnerabilities.
How can outsider attack? How can insider attack?
Thanx, Deep Halo