MalwareSecuring the network fabric versus the perimeterGary KinghornJanuary 25, 2010With regards to network security and setting perimeters, what constitutes legitimate network activity?