Chapter 4. Putting It All Together: Threats and Security Equipment

The discussion to this point has centered on potential threats and the technology and equipment that can be used to guard against attacks. This chapter takes that information and offers a range of security topologies that organizations can implement to reflect their tolerance for risk. Risk tolerance determination is explored in Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.”

This chapter covers the following topics:

• Threats, targets, and trends

• Lowering risk exposure

• Security topologies

Threats, Targets, and Trends

Many types of attacks have been discussed in the previous chapters, ...

Get The Business Case For Network Security: Advocacy, Governance, And Roi now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.