Chapter 3. Secure Networking Threats
This chapter covers the following topics:
Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. —Sun Zi, The Art of War
That vulnerability is completely theoretical. —Microsoft
As discussed in Chapter 2, “Security Policy and Operations Life Cycle,” when considering the characteristics of your network security system, you must understand the likely threats your network will encounter. The bulk of the information contained in this chapter outlines the various attack classes you must consider when designing your network. Because ...
Get Network Security Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.