This means setting up firewalls, proxy servers, virtual private networks, and possibly even a public key infrastructure.(8) Monitoring network security within a closed network is not easy, but it is not nearly as difficult as trying to manage access control and other security policies when tens of thousands of retail customers may be permitted to log in to a computer system.