v6ops-1----Page:3
1  2  3  4  5  6  7  8 

Structure of the draft
Scenarios
Administrator misconfiguration
User misconfiguration
Malicious activity
Methods to mitigate
Varying degrees of complexity/practicality
Other considerations
PPT Version