Sample I.T Securty Policy – Server Security
Now we are proceeding towards the Server Security Policy, which was quite tiresome to draft. 6‐SERVER SECURITY “IS” CONSIDERED THE FOLLOWING: 1. Limit the number of protocols in use throughout the...
View ArticleSample I.T. Security Policy – Remote Access Security
Finally we are almost proceeding towards the completion of the Sample I.T Security policy, we have just two more topics to cover. Coming days I will try to complete that, here we are with Remote Access...
View ArticleHow to configure DHCP Snooping in a Cisco Catalyst Switches.
So here we go, with the configuration of DHCP snooping on a Cisco Switch. This feature protects the network by allowing the Cisco Switches to accept DHCP response message only from the authorized...
View Article
More Pages to Explore .....