IoT & ICS Security
Threats and Breaches
BGP does a great job of identifying optimal paths across the internet, but its lack of security controls allows the protocol to be exploited. Whenever someone asks me, “What is border gateway routing protocol (BGP)?” I always use the following analogy to explain it: BGP is like the postal service. When you address a letter..
- * Must be original when published
- * Must be vendor neutral
- * Must be transparent as to authorship
- * Must be of value to the community