
|
Out of Scope Opportunistic Encryption Requires alternate infrastructure (DNS) Indirect (non-security) protection TCP window attenuation RST windowing, timestamps, TTL filtering TCP cookies Port randomization, SYN cookies Application-specific filtering Content validation |