First page Back Continue Last page Summary Graphics

Hardware Planning

  • Once your security policy begins to take shape, you should consider your hardware. Are you running a single machine on a dialup or an enterprise network connected by OC12? Cablemodem, DSL or T3? Secure facility (a whole other ball of wax) or University computer lab? These should factor into your planning. You should also take time to inventory the hardware in your machines. Get makes, models, serial numbers, MAC addresses, etc. Put it on paper and file it away. To date, no method has been perfected to remotely alter characters on paper.

    Notes: