Chapter 3. Processes and Procedures

“...There’s a time for daring and there’s a time for caution, and a wise man understands which is called for....”

—Dead Poets Society

“...All he’d wanted were the same answers the rest of us want. Where did I come from? Where am I going? How long have I got?”

—Blade Runner

By the end of this chapter, you should know and be able to explain the following:

• The processes for managing and responding to security advisories within your organization

• Which organizations produce security advisories

• What a zero-day alert is and how you should respond

• Best practices for handling updates

• Define an Access Control List (ACL) and how to use one within a networking environment

Answering these key questions will enable ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.