Author: JT Smith
From a Cisco white paper: “Without a security policy, the availability of your network can be compromised. The policy begins with assessing the risk to the
network and building a team to respond. Continuation of the policy requires implementing a security change management practice
and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons
learned.”
network and building a team to respond. Continuation of the policy requires implementing a security change management practice
and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons
learned.”
Category:
- Linux