
2
Customer Needs Assessment
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Types of Users | . |
Employees | . |
Temporary Employees | . |
Guests | . |
Network Skills | . |
Recording Information about Users | . |
Types of Connections | . |
Wired Connections | . |
Wireless Connections | . |
Remote Connections | |
Recording the Types of Connections Available to Users | |
Access Control Zones |
Determine Risk Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Regulatory Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Quantify Your Company’s Risk Tolerance . . . . . . . . . . . . . . . . . . . . . .
Vulnerability to Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .