ABSTRACT

Today, each and every organization operates on an information systems infrastructure that is internal as well as external. In both cases there are embedded risks. There are two factors in assessing the operational worth of an information systems infrastructure: the identification of the inherent risks and the availability of appropriate fallback positions. In a system, every piece of hardware plays a role in the mission of the organization. Based on the importance of that role, appropriate security measures must be taken. Software will never reach the hardware level of metrics because software development is a 100" intellectual process, and as such it is subject to human parameters. Laptops and notebooks have become permanent companions, and their exposure or loss can, in most cases, be catastrophic. As a minimum protection, one may install a Full Disk Encryption that normally encrypts everything in the hard disk except the Master Boot Record (MBR).