Ten Days to Network Security
This paper will present ten days of effective tasks, with a quick task and long term task each day. Each essential security action listed below in the day-by-day tables has three characteristics: 1) Focuses on real threats rather than theoretical threats; 2) Can be implemented quickly and inexpensively; 3) Are proven and effective Overall, what occurs is the development of a comprehensive security program. According to Pipkin (1), the five parts of a security program are: Inspection, Protection, Detection, Reaction, and Reflection. As the days progress, each of the five parts begin to get fulfilled, some at a greater level than others.
438 (PDF, 2.36MB)
6 Aug 2001