Chapter 10. Planning a Threat Control Strategy
This chapter covers the following topics:
The time from knowledge of a vulnerability to the release of an exploit has decreased. Some exploits are designed to have global impact within minutes. Some exploits are also persistent and are difficult to eradicate.
Trends in Information Security Threats
Threat Control Guidelines
General threat control guidelines include the following:
• Policies and processes must ...