Secure your network endpoints
Source: Addison Wesley Professional
Understand what is missing in your present network, build a better model for your network, and use network endpoints to control the amount of risk introduced into your enterprise. In this sample chapter from Endpoint Security, explore the notion that the network and the endpoints that populate it is a problem that can be expressed as a closed-loop process control problem. Begin by discussing a new way to look at the network and the security systems that inhabit it which will help illuminate how network technology interacts with security technology. Then, learn how to map business processes to your security model. Finally, investigate nomenclature and iconology, understanding that by using standardized schematic representations, you will be able to convey the complexity of security environments in a more concise and effective manner.
Title: Endpoint Security
Published: March 2007
Author: Mark Kadrich
Chapter: Chapter 3: Something Is Missing
Published by Addison Wesley Professional