
2
Customer Needs Assessment
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 
| Types of Users | .  | 
| Employees | .  | 
| Temporary Employees | .  | 
| Guests | .  | 
| Network Skills | .  | 
| Recording Information about Users | .  | 
| Types of Connections | .  | 
| Wired Connections | .  | 
| Wireless Connections | .  | 
| Remote Connections | |
| Recording the Types of Connections Available to Users | |
| Access Control Zones | 
Determine Risk Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Regulatory Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Quantify Your Company’s Risk Tolerance . . . . . . . . . . . . . . . . . . . . . . 
Vulnerability to Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
