chapter  9
26 Pages

Internet Cloud Security

Identity theft and plenty of other security breaches do not necessarily happen because of lack of care; a more potent reason is that information thieves are so ingenious. Companies normally apply existing risk assessment tools connected to security capabilities and exercise controls. They use firewalls and other routines, address regulatory and audit issues, develop a backup process (in case the need arises), and demand security safeguards for computers and communications vendors.