In this session, we discuss the ways enterprises might want to think about migration to IPv6.
Some vulnerabilities may be the same as IPv4 while others will different.
Vulnerabilities may be introduced by additional complexity, for example, transition mechanisms or dual-stacking.
When many enterprises think about security, a number of areas are involved. These include:
Audits/Compliance,
Threat detection,
Risk analysis,
Root cause determination,
Encryption,
Privacy,
Confidentiality, and
Penetration testing
Become INTC Member (free) : https://industrynetcouncil.org/member...
Subscribe to IIESoc : https://www.iiesoc.in/contact