Chapter 10. Planning a Threat Control Strategy

This chapter covers the following topics:

Threats

Trends in Information Security Threats

Threat Control Guidelines

Threat Control Design Guidelines

Integrated Threat Control Strategy

Cisco Security Intelligence Operations

Threats

The time from knowledge of a vulnerability to the release of an exploit has decreased. Some exploits are designed to have global impact within minutes. Some exploits are also persistent and are difficult to eradicate.

Trends in Information Security Threats

Image

Threat Control Guidelines

General threat control guidelines include the following:

• Policies and processes must ...

Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.