The NCSA Guide to PC & LAN Security


Stephen Cobb, CISSP

Chapter 3: Security Planning


This chapter is about: Risk analysis and security policy

...the chapter helps you to take some important first steps on the road to a secure computing environment. You read how to assess the risks inherent in the use of personal computers, and how to plan and implement appropriate defensive measures. The main focus of this chapter is planning within an organization and thus most remarks are addressed to support staff rather than SOHO and group users. However, it is generally helpful for all users to be familiar with the general principles of analysis, policy-making and implementation, that are presented here.

For companies active in this field check out the following Hot Links at NCSA:

The Story So Far

  • No typos or errors reported so far.
  • Links and supplemental info being prepared.
  • Check back in 10 days for more links and info.

Table of Contents with Links to Chapters

[Top of Page] [PC LAN Security Home Page] [Table of Contents]
This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb