09121423 - Master IT Training Book

9/11/23

1.1 INTRODUCTION 7 1.2 ACKNOWLEDGEMENT OF OTHER DOCUMENTS REVIEWED 8 1.3 PURPOSE OF THIS BEST PRACTICES REFERENCE 8 1.4 PRINCIPLES OF SECURE NETWORK DESIGN 9 1.5 KEY NETWORK SECURITY DEFINITIONS

10 1.6 KEY NETWORK OPERATOR / STAKEHOLDER DOCUMENTATION

85

CHAPTER 2 2.0 NETWORK HARDWARE 2.1 NETWORKING DEVICES

2.2 PHYSICAL ACCESS CONTROLS AND SECURITY 2.3 PHYSICAL PORTS AND WIRED CONNECTIONS 2.4 DISASTER RECOVERY AND REDUNDANCY (PHYSICAL)

86

43

Made with FlippingBook - Online catalogs