This chapter covers the following topics:
The time from knowledge of a vulnerability to the release of an exploit has decreased. Some exploits are designed to have global impact within minutes. Some exploits are also persistent and are difficult to eradicate.
General threat control guidelines include the following:
• Policies and processes must ...