-
Essay / Business Security Case Study - 1317
It specifies what an employee is authorized to do and with what resources. The policy also includes non-employees such as consultants, business partners, customers and terminated employees. Additionally, security policies are defined for Internet mail and virus detection. It defines the cyclical process, if any, used to review and improve security. Perimeter SecurityThis describes a first line of defense that external users must address before authenticating to the network. This is the security of traffic whose source and destination are an external network. Many components are used to secure the perimeter of a network. The assessment examines all perimeter devices currently in use. Typical perimeter devices are firewalls, external routers, TACACS servers, RADIUS servers, dial servers, VPN concentrators, and modems. Network