answersLogoWhite

0

The procedures for securing a network revolve around securing confidential information and the assets (resources) of a company's network. You have to ensure that confidentiality is maintained, along with integrity and availability. How you go about doing that depends on the company and the type of network, access to the network, etc.

User Avatar

Wiki User

15y ago

What else can I help you with?