First page Back Continue Last page Summary Graphic
Plan of Action
Develop a plan of action when a security policy is violated.
Response to security violations from the outside.
-
Response to security violations by local users (from the inside).
-
Response strategies.
-
Define the responsibilities of being a good citizen on the Internet.
-
Contacts and responsibilities to external organization (CERT, etc).