> Yet when I go through the SAFE documentation, I find:
>      7 Axioms of types of targets (p. 5 of PDF)
>      3 Types of Expected Threats (p. 10)
>      3 separate validation services for remote user access (p. 30)
>     12 elements of the taxonomy of network attacks (p. 56), some of
>        which are actually host attacks.
> 
> No number that is four.

    Uhm, this is 4-items list... ;-)


Marko.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74310&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to