Following a structured set of steps when developing and implementing network securitywill help you address the varied concerns that play a part in security design. Many security strategies have been developed in a haphazard way and have failed to actually secureassets and to meet a customer’s primary goals for security. Breaking down the process of234 Top-Down Network Designsecurity design into the following steps will help you effectively plan and execute a security strategy:1. Identify network assets.2. Analyze security risks.3. Analyze security requirements and tradeoffs.4. Develop a security plan.5. Define a security policy.6. Develop procedures for applying security policies.7. Develop a technical implementation strategy.8. Achieve buy-in from users, managers, and technical staff.9. Train users, managers, and technical staff.10.Implement the technical strategy and security procedures.11.Test the security and update it if any problems are found.12.Maintain security.Chapter 2 covered steps 1 through 3 in detail. This chapter quickly revisits steps 1through 3 and also addresses steps 4, 5, 6, and 12. Steps 7 through 10 are outside thescope of this book. Chapter 12, “Testing Your Network Design,” addresses Step 11.
đang được dịch, vui lòng đợi..