 |
 |
 |
 |
 |
 |
 |
 |
 |
| • |
Think
about Assets, Threats and
|
|
|
|
Vulnerabilities
FIRST
|
|
|
| • |
Find
an appropriate (and minimally
|
|
|
|
complex)
Policy Model
|
|
|
| • |
Match
your OS capabilities to the policy
|
|
|
|
model
as best you can
|
|
|
| • |
Train
staff to recognize social engineering!
|
|
|
| • |
Train
staff to make a habit out of the policy!
|