• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 23. Office 2003 Security Environment > Overview of Office Security

Overview of Office Security

Establishing the most secure computing environment possible requires limiting the vulnerability of applications and data to malicious attacks. Unfortunately, closing all the possible holes in an organization’s security is difficult, maybe impossible. Therefore, one of the best methods of establishing a more security-enhanced environment is to limit the number of possible avenues of attack.

The methods discussed in this chapter of the Microsoft Office 2003 Editions Resource Kit should help the administrator implement procedures to help limit direct assaults on data from external and internal attacks. Part of implementing these methods is training users on how to protect themselves and the company from attack. This training usually builds user awareness of the issue of security and ownership of the data they are trying to protect.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint