Response Classes
Packet authentication
Find out who is sending the packets
“Flow” identification
If we can identify it, can we control it?
Can we withhold authorization?
Previous slide
Next slide
Back to first slide
View graphic version