Discusses risk assessment and strategies for protection of an information system. There are 4 sources listed in the bibliography of this 4-page paper.