- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
there are many ways to protect your business and your systems against threats. in order to evaluate and improve your computer security you will need a concept and a plan
in this post I will be describing how security thinking in general has evolved from a traditional to a more modern approach and why the modern approach may give you better clues for protecting your information system
traditional security focuses heavily on safeguarding of physical assets. to achieve this objective there is a range of measures that can be ranked from passive to active. usually passive measures are more cost efficient, while active measures offer more protection at a higher cost
take the example of protecting assets in a building:
- put everything behind solid walls would be the first thing
- locking windows and doors would be additional passive measures
- while having an armed guard could be a supplemental active measure
now, in modern security the balance has shifted away from assets towards protection of systems. here the main objective is to detect intrusions. in this approach assets are regarded as expendable. the most important is to prevent repeated intrusions and continued damage. the measures that are applied can be classified according to:
- reliability and speed of intrusion detection
- appropriate response
- damage limitation
- fencing
- cameras and alarm
- dogs and guards
- call the police
if we now switch from buildings to information systems, the modern approach with its focus on intrusions is more suited and provides a better handle to get you thinking on what is needed:
- if hackers intrude in your system you may not even know that this is happening
- when you detect intrusions, you may wish to watch and study - before acting to stop them
- information is the asset to be protected. it is a soft asset that is present in people's heads besides being contained in computer files
- computer files are easily transferred, carried around and stored in cloud environments
you may lock the doors and windows of your computer system (and you should), but what really counts is that you detect the intrusions and respond appropriately
https://funzzionale.com/
design & development of business controlling applications - personal solutions for busy managers on the go #finance #business