Threat Mitigation

For the designs in this chapter, it is a good idea for you to spend time mapping the security technologies discussed thus far in the book against the policy requirements and risk analysis from Chapter 2, "Security Policy and Operations Life Cycle." Referring to Table 6-1, you can see how the technologies can map against the relevant attacks. In the designs shown in this chapter, you will see how the deployed technologies mitigate the top threats. This gives you a good start, but the designs should later be tuned based on your own requirements.





Network Security Architectures
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors: Sean Convery
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net