In this episode we continue with the scenario we created in episode 11, Dorothy’s graphic design business. We’ve already covered the 6 phases of the Cisco Network Lifecycle. It’s time to focus on information security best practices. We tried to follow the NIST “Small Business Information Security: Fundamentals” document . We dumped that in favor of the CIS top 5 critical security controls.

The Network

Links

  1. NIST Small Business Information Security: the Fundamentals
  2. Top 5 CIS Controls
  3. Nmap & ndiff – Possible solution for automated inventory scans.

 

 

#13: Applying Information Security Part 3

Listen |