Configuring Networks

The configuration of your network impacts directly on its performance and affects its stability and Information Security.

To view the related Policy click      

  • Poor network stability can threaten your business operations.

  • Design a network for stability. That way, even if one part should fail, the overall network will remain operational.
  • Consider duplicating key parts of the network such as routers, using separate cables.
  • Inadequate control over access to your network can jeopardise the confidentiality and integrity of your data.

  • Strike a balance between exercising too much and too little control.
  • Configure Information Security controls during network setup. Post setup controls are harder to implement.
  • Ensure that any modification to the network does not either dilute Information Security or introduce new threats.
  • Regularly monitor and verify the effectiveness of network Information Security.
  • Ensure that the network design and setup are adequately documented, otherwise this in itself poses an Information Security risk.
  • Slow or inadequate system response times impede business processing.

  • Estimate usage and capacity requirements for the network in a sizing exercise. Consider the peaks, troughs and concentrations of activity.
Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page