Thursday 8 November 2007

10.8 Reducing Risks

Protecting against internal threats:
  • Audit trails - provide evidence or wrong doing and enable retracing of errors
  • Encryption - prevents access to unauthorised personnel
  • Physical security - prevention
  • Biometrics
  • Access levels (full rights, read only, write only, update, delete, append, no access)

Protecting against external threats:

  • Firewalls
  • Access logs
  • Virus checkers
  • Physical secutiry

Legislation goes some way to disuade people trying to gain access to your information, but does not actually prevent this happening.

No comments: