ABSTRACT

In the present business environment, information security is a trade-off n between open access and protection. is trade-off must be managed through a carefully chosen security policy, a n clear selection of security targets, and the availability of effective tools.