Do not buy Ionizer -
just keep the windows open!
Decisions on key security issues are far from trivial and often quite confusing. Where to start? How to achieve cost-effective level of security for the project at a reasonable price?
When the stakes are high the very important aspect of business is the sphere of security. Business security is not just a question of technology. If someone thinks that technology can solve security problems, he does not understand this problem and does not understand technology. Security is not a product, it is a process.
Risk management:
One part of risk management process is balancing the costs of protection and the level of exposure to the risk. When these two are at approximately same level, such as shaded in the picture, security measures are well-balanced and practical. Otherwise, on defense can be spent more (green line), or less (red line) than it should be.
Security systems include:
- Local protection
- Global security
- Safety feasibility
- Data protection
- Secrecy of communication
- Security of the client
- Security of Project
Risk management includes the following subprocesses:
1. Identification of risks,
2. Analysis and assessment of risk (probability of risk, size of the impact - loss),
3. Planning how to avoid the risk and how to response to risk, that might be:
4. Control of reactions applied to the risk.