Chapter 7. Planning a Threat Control Strategy

Current trends in security threat vectors require a carefully planned threat control strategy. Trends affecting security include persistent application layer exploits, using social engineering to exploit the trust architecture of the enterprise, the pervasiveness of mobility and consumerization, and the insidious motivations behind the behavior of the attackers. All of these trends result in the need for dynamic security intelligence gathering and distribution, early warning systems, and application layer inspection for mobile services where data and applications are hosted in the cloud. This chapter suggests design principles to plan a threat control and containment strategy using firewalls and intrusion ...

Get Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.