Data Protection and Information Lifecycle Management

 < Day Day Up > 

In This Chapter:

  • Least Privilege

  • Defense in Depth

  • Diversity of Defense

  • Encryption

  • Typical Attacks

  • Key Points

There are thousands of books on computer security. They range from broad overviews written for IT managers to how-to books for system administrators to academic tomes about encryption. What they have in common is a language and set of concepts about security. It is important to understand this language as it applies to data protection. Protecting systems from intruders reduces the chance that data will be destroyed or stolen. System security must be part of the data protection strategy.

This chapter is designed to explain quickly some of this language and the key concepts. As one would expect, it does so from a data protection and storage point of view. The principles are, however, universal.

Figure 5-0.

     < Day Day Up > 

    Категории