O'Reilly logo

CCIE Security v4.0 Quick Reference, Third Edition by Umesh Lakshman, Lancy Lobo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Security Policies and Procedures, Best Practices and Standards

The Need for Network Security Policy

The primary reasons behind network security are technology and configuration weaknesses, policy vulnerabilities, and intrusion leading to exploitation of network resources. Networks must address all vulnerabilities using a sound security policy that is defined before granting access to network resources. The policy must constantly be reviewed to avoid exploitation. Take care to address threats from within and outside the network. Protocol and application vulnerabilities must be addressed as part of the security policy to counteract exploitation. For more information about the requirements for a robust network security policy and best ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required