Chapter 15. Managing Network Security

To this point the primary focus has been on best practices for securing a network. The rest of this book will focus on how to monitor and enforce the security policy that is in place. This is another area where organizations often fall short. After gathering the requirements, putting together a strong security policy, and locking down the network, employees and administrators will allow security practices to lapse. New equipment is not properly secured and the importance of the organization’s security policy is not properly stressed to new employees.

Loosening of network security occurs because administrators and managers allow it. The help desk is understaffed so employees are allowed to install their own ...

Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.