Cisco Networks pp 481-553 | Cite as

Advanced Security

  • Chris Carthern
  • William Wilson
  • Richard Bedwell
  • Noel Rivera

Abstract

Before we start, let’s be realistic about the expectations that there cannot be a 100% secure information system (IS). There are too many factors to evaluate that are out of your control, including the human factor. Therefore, security is more of a trade-off art of balancing risk. It goes without saying that complex systems with millions of lines of code are harder to secure than simpler systems. Usually, there are oppositely proportional factors that contribute to the security of a system, such as flexibility vs. narrow scope, and factors that are directly proportional to security of the system, such as the time invested securing the system. However, factors that tend to increase the security of the system also tend to increase cost, and so a careful balance must be found between time, cost, flexibility, and security.

Keywords

Span Tree Certificate Authority Extensible Authentication Protocol Address Resolution Protocol Method List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Chris Carthern, William Wilson, Richard Bedwell, and Noel Rivera 2015

Authors and Affiliations

  • Chris Carthern
    • 1
  • William Wilson
    • 1
  • Richard Bedwell
    • 1
  • Noel Rivera
    • 1
  1. 1.AEUSA

Personalised recommendations