Home > Articles


  • Print
  • + Share This
This chapter is from the book


Whether you prefer to classify threats by their location—internal or external—or by their type—reconnaissance, unauthorized access, denial of service, or data manipulation—depends on your preference as much as it depends on what you see happening in your network. When it comes time to do something about the threat, however, the first thing you need is a security policy, so that's where we'll turn next.

  • + Share This
  • 🔖 Save To Your Account