Xem mẫu
Planning a Threat Control Strategy
© 2012 Cisco and/or its affiliates. All rights reserved. 1
Contents
In this chapter, we will
• Evaluate the current state of enterprise security in the presence of evolving threats
• Describe design considerations for a threat protection strategy to mitigate threats as part of a risk management strategy
• Describe how Cisco strategizes threat control and containment
© 2012 Cisco and/or its affiliates. All rights reserved. 2
Trends in Network Security Threats
Recent threat vectors include the following:
• Cognitive threats: social networks (likejacking)
• Smartphones, tablets, and consumer electronics exploits
• Widespread website compromises
• Disruption of critical infrastructure
• Virtualization exploits
• Memory scraping
• Hardware hacking
© 2012 Cisco and/or its affiliates. All rights reserved. 3
Trends in Network Security Threats
The following is a list of the specific trends that can be gathered from the evolution of threats in information security:
•Insidious motivation, high impact
•Targeted, mutating, stealth threats
•Threats consistently focusing on the application layer
•Social engineering front and center
•Threats exploiting the borderless network
© 2012 Cisco and/or its affiliates. All rights reserved. 4
Threat Mitigation and Containment: Design Fundamentals
The result of the recent trends in information security threats is the need for an updated, carefully planned threat control and mitigation strategy, and a revision of old design paradigms.
• Policies and process definition • Mitigation technologies
• End-user awareness
© 2012 Cisco and/or its affiliates. All rights reserved. 5
...
- tailieumienphi.vn
nguon tai.lieu . vn