How can I secure our data from hackers?
Requires Free Membership to View
You can secure your data by building a risk assessment program that builds defense in depth. Broad steps include:
- Risk assessment
- Policy
- Implementation
- Training
- Auditing
In reality, it's not always easy as you must try and find a balance between the protection cost and the value of the informational asset. For example, if you have an information classification system but also have encrypted data, you have put two security controls in place. In this example, strong controls have been placed on who has access to the information; the physical devices the information is located on has been secured; and when it is in transit it is only transmitted in a encrypted form. While this doesn't mean the information cannot be attacked or disclosed, it does mean you have placed several effective barriers that will deter its release.
This was first published in July 2007
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation