Mitigating Threats in Remote-User Networks
Table 17-4 presents the threats that can be anticipated for the remote-user network design model and summarizes the mitigation techniques for each anticipated threat.Figure 17-2 illustrates the remote-user threats and threat mitigations that can be expected within the various options available in the remote-user network design model.