Summary

This chapter stressed the importance of having a security policy, and it culminated with a definition and an example of such a policy. If an SMB does not have a policy that identifies assets to be protected and that considers the cost of solutions versus the cost of recovery from a security breach, its approach to network security will be at best haphazard.

Generic categories of threats to an SMB's information and technology assets were introduced and clarified. Those threats include information corruption, information disclosure, repudiation coupled with lack of authentication and authorization, and DoS. Specific threat mechanisms that exemplify one or more of the preceding categories were discussed in the context of numerous scenarios. ...

Get Cisco Network Design Solutions for Small-Medium Businesses now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.