Summary and Conclusions
This chapter provided a methodology for the steps you must take now to rapidly develop a risk profile for your enterprise; and, the enterprise requirements you must adhere to in developing an Internet security policy. The chapter also explained the major services provided by Internet connectivity. Finally, it also mapped the security controls available to the services the enterprise can help protect.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
“Internet Security Policy: A Technical Guide,” copyright 2006 RXN Communications, RXN Communications, Victoria, Minnesota 55386, USA, 2006.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
John R. Vacca, Satellite Encryption, Academic Press, Jul 1999.
John R. Vacca, The Essential Guide To Storage Area Networks Prentice Hall, Nov 2001.
John R. Vacca, Electronic Commerce, 4th edition(Networking Series), Charles River Media, Aug 2003.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Steps to Take Now. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)
