X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 44 / 55

161 views

0 shares

0 downloads

0 comments

44 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Subordinate Plan Classification

Once potential damage has been assessed, subordinate plan must be developed or identified

Subordinate plans will take into account identification of, reaction to, and recovery from each attack scenario

Each attack scenario end case is categorized as disastrous or not

Qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views161
Page views161
Page last viewedSat Dec 03 04:38:56 UTC 2016
Pages55
Paragraphs604
Words4124

Comments