Track 4 - Internet Network Management - Additional Documents
Business Plan
ISP Business Plan Model - Excel Spreadsheet
Security
ISP Security Considerations - Internet Draft -
draft-ietf-grip-isp-expectations-00.txt
User Security from an ISP - Internet Draft -
draft-ietf-grip-user-01.txt
Detecting Signs of Intrusion (PDF)
Security for a Public Web Site
Security for Information Technology Service Contracts
Securing Desktyop Workstations
Preparing to Detect Signs of Intrusions
Responding to Intrusions
Securing Network Servers
Process analysis checklist
Examples of contract language for terms and conditions or statements of work
Maintaining currency by periodically reviewing public and vendor information sources
Identifying tools that aid in detecting signs of intrusion
Establishing and maintaining a physical inventory of your computing equipment