Security Entry Points
Consider some of the following issues when designing your security and setting up your network, systems, and application programs.
- How will you deal with a hostile takeover at one of your sites?
- Do users have limited access to only what they need?
- Can we disable user access quickly if necessary?
- Viruses through e-mail attachments
- Hostile programs installed by your users