Talk With an Expert

Ten Days to Network Security

Ten Days to Network Security (PDF, 2.36MB)Published: 06 Aug, 2001
Created by:
Paul Zocco

This paper will present ten days of effective tasks, with a quick task and long term task each day. Each essential security action listed below in the day-by-day tables has three characteristics: 1) Focuses on real threats rather than theoretical threats; 2) Can be implemented quickly and inexpensively; 3) Are proven and effective Overall, what occurs is the development of a comprehensive security program. According to Pipkin (1), the five parts of a security program are: Inspection, Protection, Detection, Reaction, and Reflection. As the days progress, each of the five parts begin to get fulfilled, some at a greater level than others.