Problem
1) How are controls or protocols implemented to defend against attacks and to limit risk?
2) What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
3) What controls and protocols would you find in a security policy?