We rely on three core resources to protect information and other critical assets: people, processes and technology. We utilize extensive technology in the form of firewalls, anti-virus software, intrusion detection systems, encryption software, etc. The technology is managed through security practices, procedures and policies. And all of this is dependent on people to make it work.