Summary

Summary

This chapter covered security dependencies. If you were to read only one chapter of this entire book, this is quite possibly the one you should read. Security dependencies is an incredibly overlooked area in information security. Often dependencies are accidentally implemented by administrators who do not understand them. In other cases, they are designed into the product by the developer. In either case, they must be understood and managed, in accordance with your risk management philosophy and security policy.



Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net