2.6 Summary

   

This chapter has covered a variety of security models that can be used to develop a security policy for your organization. Security models are not a very exciting aspect of the security process, but a good security model is essential to developing a security policy that will be effective in the long term .

This chapter was not intended to be a comprehensive analysis of security models, but it should give you an idea of the issues involved in selecting a security model and using it to develop a security policy for your organization.

   


The Practice of Network Security. Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors: Allan Liska

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net