O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network Planning

The level of network planning depends on the size of the organization. An organization with a small number of nodes can work around a network tied together using simple network technologies. They rely on the trust relationships based on physical contact. However, even small organizations might see benefit in using network architecture to provide access control.

Another way to think about this is to call it “traffic control.” Network planners can help to limit access to secret or critical data by isolating the support systems and networks from general network traffic. There are many technologies to do this, including restricted gateways, firewalls, and air gaps. However, regardless of the technology used, policies can be written ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required