ABSTRACT

This book explains much of the technology that goes into creating a secure network. It is true that this technology can be used to provide a sense of trust in your information, but it would be unwise to pretend that a single box or line in an information security policy can provide all that is required for “security.” Information security is an iterative process. You create the policy, implement the policy, enforce the policy, and review the policy when things go wrong. Notice the emphasis on policy. The cycle of information security is not written as, “You create the firewall, you implement the firewall, you ….” You get the idea.