interceptors and malicious code-like viruses,
worms and Trojan horses. The ability of the network to
enable access to a system from anywhere is the most serious
of a network’s vulnerabilities. Given the fact that a major
benefit of a network is its ability to provide access from
elsewhere, the task at hand becomes discovering how best to
devise controls around this access