December 2011
Beginner
552 pages
13h 30m
English
You need to ensure a high level of operational security for the many assets within your organization: routers, switches, servers, laptops and desktops (Apple and Microsoft), BlackBerrys, smartphones, and so on. Pervasive threats exist, from a disgruntled employee to corporate espionage, as shown in Figure 3-1. This chapter deals with a select segment, information assurance, and how updates are managed within your organization.
Figure 3-1 Threat Agents
Before you respond to security threats, you must be able to identify them. A threat agent exploits a vulnerability in an effort ...