ABSTRACT

We have previously looked at dozens of ways that adversaries might launch attacks on systems, data, and even personnel. We have now shifted the focus to solutions that mitigate many of the risks and threats. We have described how security is implemented as a series of layers, building upon the layers below moving from the physical to the logical. Atop the highest layer, a public key infrastructure (PKI) completes the security picture with a comprehensive solution that permeates all processing — person to person, person to resource, and resource to resource.