May 4, 2008

Security Entry Points

Security Entry Points

Consider some of the following issues when designing your security and setting up your network, systems, and application programs.

  • How will you deal with a hostile takeover at one of your sites?
    • Do users have limited access to only what they need?
    • Can we disable user access quickly if necessary?
  • Modems
  • Viruses through e-mail attachments
  • Hostile programs installed by your users

Security Cost

Quantify the cost of your security effort versus the cost of recovery from damage. Do the following to help determine worthwhile security policy:

  • Quantify assets
  • Analyze worth
  • Estimate recovery costs.

No comments:

Post a Comment

Popular Posts