Chapter 24
Formal Analysis of Policy-Based Security Configurations in Enterprise Networks
S.K. Ghosh, Ehab Al-Shaer and P. Bera
24.1 Introduction
Today, most of the enterprise networks deploy policy-based security configurations due to extensive use of various network services and pervasive computing applications for accessing network resources. However, most of the enterprise networks face security threats because of improper security policy and its incorrect implementations. Typically, an enterprise network consists of a set of network zones corresponding to different units/sections of the organization. These network zones are interconnected through various access routers (Layer 3 routers). The overall organizational security policies of such ...
Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.