Security Management – Good Practice
reporting procedure for security events
e.g. break-ins
abuse email address for customers to report complaints (abuse@your-isp.net)
control internal and external gateways
control firewalls (external and internal)
security log management
centralised logging host
Previous slide
Next slide
Back to first slide
View graphic version