In this episode we continue with the scenario we created in episode 11, Dorothy’s graphic design business. We’ve already covered the 6 phases of the Cisco Network Lifecycle. It’s time to focus on information security best practices. We tried to follow the NIST “Small Business Information Security: Fundamentals” document . We dumped that in favor of the CIS top 5 critical security controls.
- NIST Small Business Information Security: the Fundamentals
- Top 5 CIS Controls
- Nmap & ndiff – Possible solution for automated inventory scans.