ABSTRACT
The level of security required by any network is wholly dependent on the type of data contained on the network. There is a large
Workstations 134 Software 135 Hardware 137 Network 139 People 143 Special Considerations for Cloud Computing 144 Summary 144
Software 145 Hardware 145 Network 145
Endnotes 146
difference in the necessary level of protection on a network for a law office than there would be for a florist. When analyzing the information security of a business, the audit is typically in three parts: workstations, network equipment, and people. These three areas are essential to the security of technical systems. This chapter will look at these areas and the most important elements of each for a business owner or manager to be aware of.