Ask the Expert

Why implementing adequate security challenges LAN administration

Why is planning and implementing adequate security a challenge in LAN administration?

    Requires Free Membership to View

Security requires work and constant attention. It's sad to say but many times people are more reactive than proactive. As such, we tend to respond to security incidents more easily than performing the planning and implementing up front. I usually tell people that security is a process. If you wanted to break it down it is at least six steps that flows as follows:
  1. Inventory of assets
  2. Risk assessment
  3. Policy
  4. Implementation
  5. Training
  6. Audit

Try working with management to help them understand the value of security and the potential costs if proper security controls are not implemented.

Here are a couple of incidents to help highlight the importance:

This was first published in July 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: