Planning Distributed Security

To implement an overall security policy, you need to coordinate many network security functions. Use Table A.14 to document all aspects of security that pertain to your organization. For examples of security risks, refer to the "Planning Distributed Security" chapter. List specific (rather than general) security risks for your organization. Under Mitigation Strategy, fill in details from all the chapters in this book that pertain to security, including "Planning Your Public Key Infrastructure" and "Determining Windows 2000 Network Security Strategies ."

Table A.14 Identify Potential Security Risks

Potential Security Risk

Description

Mitigation Strategy (including policies, Windows 2000 features, and other technology solutions)