The discussion to this point has centered on potential threats and the technology and equipment that can be used to guard against attacks. This chapter takes that information and offers a range of security topologies that organizations can implement to reflect their tolerance for risk. Risk tolerance determination is explored in Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.”
This chapter covers the following topics:
• Threats, targets, and trends
• Lowering risk exposure
• Security topologies
Many types of attacks have been discussed in the previous chapters, ...