X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 44 / 55

289 views

0 shares

0 downloads

0 comments

44 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Subordinate Plan Classification

Once potential damage has been assessed, subordinate plan must be developed or identified

Subordinate plans will take into account identification of, reaction to, and recovery from each attack scenario

Each attack scenario end case is categorized as disastrous or not

Qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views289
Page views289
Page last viewedSat Jan 21 14:44:59 UTC 2017
Pages55
Paragraphs604
Words4124

Comments