• Discuss how this and other information security considerations will affect the design and development process for new information systems.
• Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage.
• Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.
• Provide an overview of several systems and devices that can provide security services to meet the needs raised in the paper.