[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: survey of isp security practices



OK.....I think perhaps using this type of categorization makes more sense (especially from an operations viewpoint)......

- merike

On Nov 9, 2004, at 7:56 AM, Gregory M Lebovitz wrote:
Overall thought: may want to address it in terms of what you are trying to protect rather than how you are trying to protect, eg:
- general security around device access (for config) and management/monitoring access
- authentication/authorization
- privacy
- Filtering
- message integrity
- Image integrity
- configuration integrity, verification, rollback
- Security around routing information exchange
- authentication/authorization
- privacy
- filtering
- integrity
- DoS protection
- Logging content
- traffic
- data fields
- storage
- etc....




+++++++++++++++++++++++++
IETF-related email from
Gregory M. Lebovitz
Juniper Networks
W - +01 (1) 408 543 8002