9/11/23
1.1 INTRODUCTION 7 1.2 ACKNOWLEDGEMENT OF OTHER DOCUMENTS REVIEWED 8 1.3 PURPOSE OF THIS BEST PRACTICES REFERENCE 8 1.4 PRINCIPLES OF SECURE NETWORK DESIGN 9 1.5 KEY NETWORK SECURITY DEFINITIONS
10 1.6 KEY NETWORK OPERATOR / STAKEHOLDER DOCUMENTATION
85
CHAPTER 2 2.0 NETWORK HARDWARE 2.1 NETWORKING DEVICES
2.2 PHYSICAL ACCESS CONTROLS AND SECURITY 2.3 PHYSICAL PORTS AND WIRED CONNECTIONS 2.4 DISASTER RECOVERY AND REDUNDANCY (PHYSICAL)
86
43
Made with FlippingBook - Online catalogs