Next: Threats
Up: Networking Fundamentals: Technologies and
Previous: Broad Outline of Security
What you are protecting.
- 1.
- Hardware: CPUs, boards, keyboards, terminals,
workstations, personal computers, printers, disk
drives, communication lines, terminal servers, routers.
- 2.
- Software: source programs, object programs,
utilities, diagnostic programs, operating systems,
communication programs.
- 3.
- Data: during execution, stored on-line, archived off-line,
backups, audit logs, databases, in transit over
communication media.
- 4.
- People: users, administrators, hardware maintainers.
- 5.
- Documentation: on programs, hardware, systems, local
administrative procedures.
- 6.
- Supplies: paper, forms, ribbons, magnetic media.
1999-03-14