290 Vulnerability ManageMent
network architecture with two tiers of security will no doubt be easy
to monitor for vulnerabilities and implementing security.
In a simple network design, there may be two basic levels of secu-
rity: an Internet DMZ and an internal network. Surely, this is a simple
matter to protect with security components at the edge, at the core, and
on individual hosts. is architecture is clearly easy to manage but is
unrealistic in a complex world with complex business requirements.
An extremely complex architecture is more difficult to manage
and conceptualize in an attack. e source of vulnerabilities becomes
more difficult to identify and remediate. is is especially true while a
critical incident is unfolding. Depending on ...