Guide to Securing Legacy IEEE 802.11 Wireless Networks
It is also important to remember that secure deployment of software is only part of an overall security process,
which includes physical security, training, operational procedures, patch strategy, escalation and response plans,
disaster recovery, and many other topics. Most of these ancillary topics are not discussed in this guide.
In general, threats to VMware vCloud Director fall into two separate baskets: internal threats and external
threats. Internal threats typically involve issues of multitenancy, and external threats target the security of the
hosted cloud environment, but those lines are not hard and fast. There are internal threats that attack the
security of...