O'Reilly logo

The Business Case For Network Security: Advocacy, Governance, And Roi by Warren Saxe, Catherine Paquet

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Putting It All Together: Threats and Security Equipment

The discussion to this point has centered on potential threats and the technology and equipment that can be used to guard against attacks. This chapter takes that information and offers a range of security topologies that organizations can implement to reflect their tolerance for risk. Risk tolerance determination is explored in Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.”

This chapter covers the following topics:

• Threats, targets, and trends

• Lowering risk exposure

• Security topologies

Threats, Targets, and Trends

Many types of attacks have been discussed in the previous chapters, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required