Skip to main content

Ten Days to Network Security

This paper will present ten days of effective tasks, with a quick task and long term task each day. Each essential security action listed below in the day-by-day tables has three characteristics: 1) Focuses on real threats rather than theoretical threats; 2) Can be implemented quickly and inexpensively; 3) Are proven and effective Overall, what occurs is the development of a comprehensive security program. According to Pipkin (1), the five parts of a security program are: Inspection, Protection, Detection, Reaction, and Reflection. As the days progress, each of the five parts begin to get fulfilled, some at a greater level than others.

438 (PDF, 2.36MB)

6 Aug 2001
ByPaul Zocco
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.