Developing An Effective Network Security Policy