time-based model of
security 242
defense-in-depth 242
authentication 243 authorization 243
multifactor
authentication 245
access control matrix 245 compatibility test 245
social engineering 246
border router 248
firewall 248
demilitarized zone
(DMZ) 249
Transmission Control
Protocol (TCP) 250
Internet Protocol (IP)
250
routers 250
access control list (ACL)
250
static packet filtering 250