Chapter 36. Highlighter’s Index

Planning Network Security

Basic Security Tasks

Authentication
Controlling access to resources
Auditing resource access
Encryption

Business Requirements

Needs of management
Needs of users
Company structure
Size and locations

Technical Requirements

Connectivity and bandwidth
Performance
Administration

Company Information

Information flow
Product life cycle
Decision making
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.162.49