O'Reilly logo

CCNA Security (640-554) Portable Command Guide by Bob Vachon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Planning a Threat Control Strategy

This chapter covers the following topics:

Threats

Trends in Information Security Threats

Threat Control Guidelines

Threat Control Design Guidelines

Integrated Threat Control Strategy

Cisco Security Intelligence Operations

Threats

The time from knowledge of a vulnerability to the release of an exploit has decreased. Some exploits are designed to have global impact within minutes. Some exploits are also persistent and are difficult to eradicate.

Trends in Information Security Threats

Image

Threat Control Guidelines

General threat control guidelines include the following:

• Policies and processes must ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required