ABSTRACT

All IT systems have a security form, e.g. firewall or backup procedures [Grzywacz (2003), Kifner (1999), Kowasz (2006)]. Single security elements may not prevent data from being attacked [Polaczek (2006), Zielinski (1998)]. It is necessary to have a proper, well though-out architecture of solutions or an audit of the whole environment, especially in the case of more complex systems.