v6ops-1----Page:3
1
2
3
4
5
6
7
8
Structure of the draft
Scenarios
Administrator misconfiguration
User misconfiguration
Malicious activity
Methods to mitigate
Varying degrees of complexity/practicality
Other considerations
PPT Version