22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.1.2 Risk mitigation<br />

46 Lotus Security Handbook<br />

With your security policy in hand, which provides you with an understanding of<br />

the security threats and risks involved, you will have an idea of the measures you<br />

must adopt to secure your sensitive information.<br />

At this point, you are ready to design your computer security architecture and<br />

implement the computer security services.<br />

We are now ready to move on to risk mitigation. This is the single most<br />

important objective in any work that involves the implementation of security. By<br />

mitigation, we mean anything that reduces something of a negative nature. In<br />

this case, what we wish to reduce is the risks faced by an IT system as we have<br />

defined it.<br />

The kind of organization in which security is being implemented is irrelevant to<br />

this discussion since all organizations and their IT systems face some form of<br />

risk, and all should strive for the maximum amount of security possible. (It is true<br />

that some organizations are more at risk than others, but we leave that<br />

consideration to later in this book.)<br />

In order for risk mitigation (and the implementation of the security architecture) to<br />

be successful, it is imperative that the overall enterprise security policy be the<br />

responsibility of the top managers of the organization. They have to decide<br />

where the major security risks for their type of business lie and how to proceed<br />

from there.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!