O'Reilly logo

Network Security First-Step, Second Edition by Donald Stoddard, Thomas M. Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Security Policies

“...Being defeated is often a temporary condition. Giving up is what makes it permanent....”

—Marlene vos Savant

By the end of this chapter, you should know and be able to explain the following:

• What role does a security policy play in my network?

• How do I create a security policy?

• How do I deal with any security policy violations?

• What security policies are appropriate for my organization?

• What are the Security Standards and do they apply to my organization?

Being able to answer these key questions will enable you to understand the overall characteristics and importance of a network security policy.

Having clear, definable, enforceable, and up-to-date security policies is the most essential first step in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required