Security Audit Continued
The most important security information to have is an emergency and disaster recovery plan in case of network failure.
Redundancy provides security. Redundancy can be implemented in different ways including:
- Using bridges and routers to filter traffic based on file information
- Backup procedures
- Virus protection
- RAID