ABSTRACT

The level of security required by any network is wholly dependent on the type of data contained on the network. There is a large

Workstations 134 Software 135 Hardware 137 Network 139 People 143 Special Considerations for Cloud Computing 144 Summary 144

Software 145 Hardware 145 Network 145

Endnotes 146

difference in the necessary level of protection on a network for a law office than there would be for a florist. When analyzing the information security of a business, the audit is typically in three parts: workstations, network equipment, and people. These three areas are essential to the security of technical systems. This chapter will look at these areas and the most important elements of each for a business owner or manager to be aware of.