What are the steps when planning and implementing firewalls and proxy servers on your networks?

What will be an ideal response?


Because most security policies operate somewhere between the two extremes of "anything goes" (totally optimistic) and "no connection" (totally pessimistic), you will find the following set of steps useful when planning and implementing firewalls and proxy servers on your networks:
1. Plan
2. Establish requirements
3. Install
4. Configure
5. Test
6. Attack
7. Tune
8. Implement
9. Monitor and maintain

Computer Science & Information Technology

You might also like to view...

What are the options for sharing the Public folder in Windows 10?

What will be an ideal response?

Computer Science & Information Technology

Google+ is an example of a(n) ________ network

Fill in the blank(s) with correct word

Computer Science & Information Technology

A series of rows that contain related data is known as a ________

A) block B) query C) list D) record

Computer Science & Information Technology

Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)

A) 802.11 B) 802.11a C) 802.11b D) 802.11g

Computer Science & Information Technology