A properly secured network is contingent upon the proper design methodology, documented policies and procedures, and continuous monitoring and measurement of the design and implementation effectiveness. The primary objective in developing a security program is to render industrial espionage ineffective by implementing appropriate security measures.