
You can say that your information is secure when all seven of these areas have
been adequately addressed.The definition of adequately depends, however, on how
much risk exists in each area. Some areas may present greater risk in a particular
environment than in others.
Insecurity and the Internet
The federation of networks that became the Internet consisted of a relatively small
community of users by the 1980s, primarily in the research and academic communi-
ties. Because it was rather difficult to get access to these systems and the user com-
munities were rather closely knit, security was not much of a concern in this
environment.The main objective of ...