First page Back Continue Last page Summary Graphic
Once your security policy begins to take shape, you should consider your hardware. Are you running a single machine on a dialup or a network connected by OC12? Cablemodem, DSL or T3? Secure facility (a whole other ball of wax) or University computer lab? These should factor into your planning. You should also take time to inventory the hardware in your machines. Get makes, models, serial numbers, MAC addresses, etc. Put it on paper and file it away.