|
|
|
A good security policy is the first step to preventing network threats.
- Non-existent or casually enforced security policies are a major weakness.
- A security policy must be enforced to prevent compromise or unauthorized use of a network resource.
- Bad passwords, incorrect permissions, and misconfigured equipment constitute serious weaknesses to a network's security.
- Complex software with millions of lines of code is vulnerable to hackers.
|