• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 1. Assessing Risk > Who Am I Protecting Against?

Who Am I Protecting Against?

This question is bound to come up in any discussion of security, so let’s take a quick look at it. First, you aren’t always protecting against a “who.” Security of your information encompasses disaster recovery, backups, and equipment maintenance.

To be really secure, you must be prepared for an “act of God” or the eventuality that the security you put in place could fail. Let’s look at “what” first and then we’ll get to “who.”


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint