X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 42 / 55

167 views

0 shares

0 downloads

0 comments

42 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Attack Success Scenario Development

Next, create series of scenarios depicting the impact a successful attack from each threat could have on each prioritized functional area with:

Details on method of attack

Indicators of attack

Broad consequences

Attack success scenario details are added to attack profile, including best, worst, and most likely outcomes

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views167
Page views167
Page last viewedSun Dec 04 21:57:23 UTC 2016
Pages55
Paragraphs604
Words4124

Comments