This document outlines security strategies and contains figures on the foundation of security, key technology components like firewalls and proxy servers, and continuity strategies including incident response plans, disaster recovery plans, and business continuity plans. It provides a framework for security and diagrams the major steps in contingency planning.