Fortinet Document Library

Version:


Table of Contents

20.3.0
Download PDF
Copy Link

Introduction

The vast growth of the World Wide Web or the internet led to an equally enormous spiral in network security vulnerabilities which could potentially be exploited due to the immense advancement in hacking techniques and cyber-attack methodologies. The almost global use of modern complex web applications makes them easily prone to cyber- attacks and violations. These web applications contain multiple unassessed security risks and vulnerabilities. In such a scenario, network security is of prime importance.

Introduction

The vast growth of the World Wide Web or the internet led to an equally enormous spiral in network security vulnerabilities which could potentially be exploited due to the immense advancement in hacking techniques and cyber-attack methodologies. The almost global use of modern complex web applications makes them easily prone to cyber- attacks and violations. These web applications contain multiple unassessed security risks and vulnerabilities. In such a scenario, network security is of prime importance.