OPUS: Six Strategies for Defense-in-Depth
Serious issues often originate inside the network: everything from worms, viruses, and Trojan horses to unsecured wireless networks, peer-to-peer mobile communications and guest users can compromise the security of corporate networks. Thus, to address these threats, the corporate network should no longer be a single homogeneous zone in which users connect from anywhere in the network and receive the same levels of access. Instead, the network requires internal perimeterization and defenses.
| Further information on this topic can be found in the report entitled “OPUS: Six Strategies for Defense-in-Depth” which can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/opus.pdf |