In this chapter, you learn how to develop a comprehensive network security policy to counter threats against information security. You also learn about possible threats and how to describe and implement the process of developing a security policy. In this chapter, you learn about the following topics:
• Fundamental concepts in network security, including identification of common vulnerabilities and threats, and mitigation strategies
• Implementation of a security architecture using a lifecycle approach, including the phases of the process, their dependencies, and the importance of a sound security policy
The open nature of the Internet makes it vital for businesses to pay attention to the security ...