Datasheet
Other information that
can be used adversely
Here is the stuff of nightmares for a lot of us: an e-mail of a delicate or untoward
nature that gets made public or falls into the wrong hands. You know, that
e-mail you sent to a co-worker describing those annoying tendencies of your
boss, or the document that you wrote to your significant other, or informa-
tion on that Web site that you visited looking for a better job, or those off-
color jokes that you’ve been e-mailing around the office.
Our computers might hold data other than that considered to be business
propriety or PII. Yet, it might be information that is of a personal or private
nature and, if made public, could cause us embarrassment or otherwise get
us in hot water. Like other sensitive information, this information should be
protected as well. Although its compromise might not lead to someone driving
around in a car in your name, it certainly might adversely affect you if it were
to become known to others.
Filling Up Your Security Toolbox
If you’re going to effectively protect your hardware and software, PII, sensi-
tive work-related information, or any other data that, if compromised, could
have an adverse affect on you, having the proper tools to do so is critical.
Just like carpenters, plumbers, and other craftsmen stock their toolboxes so
that they can effectively practice their crafts, you, too, must fill your security
toolbox with the proper tools to get the job done.
Understanding your requirements
As much as you want to jump in and get started filling up your security tool-
box, understand what requirements you have. Not only will you select the
right security tools to get the job done
today — but perhaps for some time to
come. When you understand your requirements, you can better prepare
yourself down the road to address security threats as they present them-
selves. The following are some considerations in understanding your
requirements:
Up-front work: Before you can fill your toolbox with the right tools, you
really need to understand your requirements. Much like that carpenter
who needs to understand what type of work he will be performing so that
he grabs the right tools to perform his craft, understand what it is that you
want to achieve. Specifically, you must understand what it is that you want
to protect. Whether your goal is to have the least amount of downtime,
22
Part I: Vista Security Essentials
05_118054 ch01.qxp 10/11/07 9:38 AM Page 22