In this section, we examine some of the key principles involved in creating a secure network. We establish building blocks that will be used in formulating an effective security policy. The principles are as follows:
Open networks and knowledgeable attackers with sophisticated attack methods create the requirement for flexible, dynamic network security policies.
Examine the CIA triad: confidentiality, integrity, and availability.
Define data classification categories ...