O'Reilly logo

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition by Catherine Paquet

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Planning a Threat Control Strategy

Current trends in security threat vectors require a carefully planned threat control strategy. Trends affecting security include persistent application layer exploits, using social engineering to exploit the trust architecture of the enterprise, the pervasiveness of mobility and consumerization, and the insidious motivations behind the behavior of the attackers. All of these trends result in the need for dynamic security intelligence gathering and distribution, early warning systems, and application layer inspection for mobile services where data and applications are hosted in the cloud. This chapter suggests design principles to plan a threat control and containment strategy using firewalls and intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required