Datasheet

protect a particular document or file or protect your computer from
being stolen, or all these things — understand your requirements so that
you can select the proper tools to get the job done.
Criticality: Not only do you need to understand what it is that you want
to protect, but you also must understand how critical it is to protect it.
Understanding the length to which you are willing to go in order to pro-
tect your system or data is essential in developing a security plan and
selecting the right tools to meet your needs.
Security tolerance: Security is often the opposite of convenience. You
can do a great many things to protect your data, but too-stringent security
controls can impede your ability to do certain things. In fact, Vista puts
forth some security controls that will be considered by some folks as
annoying. You can choose to use that security feature (put that security
tool in your toolbox) or instead leave it out and opt for more convenience
over security.
For more on security requirements, see Chapter 2.
Arming yourself with technical tools
Other tools you will have in your security toolbox are technical tools, which
will play a large part in protecting your system and sensitive data from com-
promise. Vista offers a variety of security tools to assist you in appropriately
protecting your hardware, software, and associated data. The majority of this
book covers those Vista tools, but I also cover some additional third-party
technical tools that you might need to consider when your requirements go
beyond what Vista can provide. Here are some considerations when selecting
the technical tools for your security toolbox:
Understand the tools that you have available to you. Understanding all
the tools that you have available to protect yourself is indeed important.
This book provides you not with just the Vista tools that are available to
you, but also with some third-party security tools that can provide some
protections where Vista comes up short.
Understand what the tool protects. Not all security tools are created
equal. Some protect access, others assist with maximum availability, and
even others might have entirely a different purpose. If you understand
explicitly the protections that the tool provides, you can then make a
better choice as to when and how to use it. I show you exactly what
each Vista security tool can help you protect — and, just as important,
what each can’t protect.
23
Chapter 1: Getting Up to Speed on Vista Security
05_118054 ch01.qxp 10/11/07 9:38 AM Page 23