O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 24

Formal Analysis of Policy-Based Security Configurations in Enterprise Networks

S.K. Ghosh, Ehab Al-Shaer and P. Bera

24.1 Introduction

Today, most of the enterprise networks deploy policy-based security configurations due to extensive use of various network services and pervasive computing applications for accessing network resources. However, most of the enterprise networks face security threats because of improper security policy and its incorrect implementations. Typically, an enterprise network consists of a set of network zones corresponding to different units/sections of the organization. These network zones are interconnected through various access routers (Layer 3 routers). The overall organizational security policies of such ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required