Network Security Checklist by Cisco Systems, Inc.Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Network Security Checklist
by Cisco Systems, Inc.

> View this now

Published on: February 28, 2008
Type of content: WHITE PAPER
Format: Adobe Acrobat (.pdf)
Length: 3 pages
Price: FREE

Overview:
Every business should have a written (and thoughtfully prepared) network security plan in place. A thorough policy will cover topics such as:


  • Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited
  • E-mail and communications activities, to help minimize problems from e-mails and attachments
  • Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses
  • Identity policy, to help safeguard the network from unauthorized users
  • Password policy, to help employees select strong passwords and protect them
  • Encryption policy, to provide guidance on using encryption technology to protect network data
  • Remote access policy, to help employees safely access the network when working outside the office

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts