Building an Information Security Policy Part 1: Network Devices
NetworkComputing.com
In my previous blog I outlined some important business and high-level design considerations for building an effective security policy. Understanding your network topology is key to a good security policy. In a series of blogs, I will reinforce this