What is an effective countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off?
What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?