A Framework for Managing User-defined Security Policies to Support Network Security Functions

Author(s):  
Eunsoo Kim ◽  
Kuyju Kim ◽  
Seungjin Lee ◽  
Jaehoon Paul Jeong ◽  
Hyoungshick Kim
Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used by many security personnel in a variety of networks that make up the communication infrastructure. In this chapter, we are going to start with what is considered to be the most basic of all security techniques—security.policy. We will discuss several issues about security policy, like what constitutes a good policy and how to formulate, develop, write implement, and maintain a security policy.


Author(s):  
Yuu-Heng Cheng ◽  
Abhrajit Ghosh ◽  
Ritu Chadha ◽  
M. Levin Gary ◽  
Michelle Wolberg ◽  
...  

Author(s):  
Salvador Martínez ◽  
Joaquin Garcia-Alfaro ◽  
Frédéric Cuppens ◽  
Nora Cuppens-Boulahia ◽  
Jordi Cabot

Sign in / Sign up

Export Citation Format

Share Document