- Objectives
- Introduction
- AAA Overview: Access Control, Authentication, and Accounting
- Security Administration—The Importance of a Security Policy
- Keeping Up with and Enforcing Security Policies
- Risk Assessment
- Why Data Classification Is Important
- The Importance of Change Management
- Performing Vulnerability Assessments
- Chapter Summary
- Apply Your Knowledge
Introduction
This chapter examines the business aspects of security. These principles and practices form the foundation upon which strong security policies are built. The specific policies for your organization depend on a number of factors, including location, type of business, and employee involvement in network and computer management. You also discover several methods of applying security practices and policies to your network and organization, including the use of security checklists.