Describe the most common vulnerabilities, risks, and issues that your plan will address.
Include policies that protect the hardware and physical aspects of the network.
Identify hardware areas that need to be secured.
Describe steps that will be taken to ensure the security of the operating systems and network files.
Discuss measures that are necessary to protect the transfer of data for remote employees.
Apply the concepts from the unit’s assigned hands-on virtual labs.