Summary

Whether you prefer to classify threats by their locationinternal or externalor by their typereconnaissance, unauthorized access, denial of service, or data manipulationdepends on your preference as much as it depends on what you see happening in your network. When it comes time to do something about the threat, however, the first thing you need is a security policy, so that's where we'll turn next .



CSI Exam Cram 2 (Exam 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
ISBN: 0789730243
EAN: 2147483647
Year: 2002
Pages: 177
Authors: Annlee Hines

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net