Datasheet
1056
Do Not Forget about Data Protection
encrypt and decrypt network traffic. Because of the configuration, it is
an unlikely solution for a Web site but is a great way to encrypt traffic
on your network.
✦ Virtual Private Network (VPN): A VPN allows a user to connect across
the Internet to a remote network, typically her office network, and send
information between her system and the office network securely. The
information is secured because the VPN technology used creates an
encrypted tunnel between the user and the office network — any data
that travels through the tunnel is encrypted.
The preceding sections touch on a number of places that require security.
Here is a quick overview of the security steps that I have discussed so far:
✦ Secure your office environment first from physical access by unauthor-
ized persons.
✦ Set up a system for authentication, which is the idea that users must log
on to the network.
✦ After users log on to the network, they must be authorized to access
resources.
✦ When you allow someone to access resources, make sure that you
encrypt the traffic while it is in transit, especially if the information is
transmitted outside your own network.
Do Not Forget about Data Protection
In this section, you find out about how to secure your data environment
from a hacker or malicious user. When securing your systems, you want to
protect the systems from a person who damages information or systems
with or without intent. You want to be sure to secure your environment
from hackers, but at the same time, you want to protect your systems from
users on the network who may cause damage without meaning to. Accidents
can happen, so be sure to prevent accidents from happening by following
the best practices in the following sections.
Destroying data
Most office environments have strict policies in place to help secure con-
fidential information. Shredding paper documents with personal or confi-
dential information is a no-brainer, and computerized data should be no
different. A company needs strict guidelines on how to destroy data that
resides on computer hard drives.
49_487389-bk09ch01.indd 105649_487389-bk09ch01.indd 1056 9/10/09 11:03 PM9/10/09 11:03 PM