textarea=The second step is to determine the level of robustness needed to protect the network: basic, medium, or high. This information is derived from the analysis performed in the first step. The third and final step is to select and apply the appropriate level of security countermeasures needed to protect the network. For example, the following is a sample of the security functions that can be applied to the firewall based on a medium robustness level:
Ports 20 and 21 are closed for inbound and outbound FTP services
Java is denied
Only the firewall administrator has permission to change policies on the firewall
The firewall must provide a VPN function
Unsuccessful attempts to sign onto the network are logged
Internal addresses are hidden
Inbound e-mail and attachments are scanned for viruses
Resistance to attacks, such as DOS attacks, is heightened