Network security requires constant work and attention to detail. Forming a security policy, the administrator primarily conducting an inventory of resources, the protection of which is planned; identifies the users who need access to each of these resources, and finds the most likely sources of risk for each of these resources.