> Yet when I go through the SAFE documentation, I find:
> 7 Axioms of types of targets (p. 5 of PDF)
> 3 Types of Expected Threats (p. 10)
> 3 separate validation services for remote user access (p. 30)
> 12 elements of the taxonomy of network attacks (p. 56), some of
> which are actually host attacks.
>
> No number that is four.
Uhm, this is 4-items list... ;-)
Marko.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74310&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html