Summary: |
Since the first attempts to protect information, the weakest link in the security chain has always been the people involved. A system can have the most expensive firewall equipment, the best antivirus software and the greatest intrusion detection system, but if the "weakest link" is ignored it can be worthless. Hence, no matter how secure the equipment is from electronic invasion, the knowledge extracted from a legitimate user may render a computer network inoperable if used in an unauthorised manner. |