ABSTRACT

In this book, there has been a lot of focus on identifying soft targets and the prevention, mitigation, and planning methodologies that can be used in protecting these vulnerable targets. However, one soft target that is often overlooked remains to be discussed: the human interface with technology. People can visualize gates, bollards, and access barriers to a structure, as we have shown. However, they may not realize that the same principles must apply to their own world of technology. Data and digital footprints exist in almost all

Introduction .................................................................................................................................465 Basic Device Security: How Many Devices Do You Have? ..............................................466