Chapter 4. Putting It All Together: Threats and Security Equipment

The discussion to this point has centered on potential threats and the technology and equipment that can be used to guard against attacks. This chapter takes that information and offers a range of security topologies that organizations can implement to reflect their tolerance for risk. Risk tolerance determination is explored in Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.”

This chapter covers the following topics:

• Threats, targets, and trends

• Lowering risk exposure

• Security topologies

Threats, Targets, and Trends

Many types of attacks have been discussed in the previous chapters, ...

Get The Business Case For Network Security: Advocacy, Governance, And Roi now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.