Previous Lecture Complete and continue  

  1.7 Applying Fundamental Security Principles To Network Design