When thinking about what makes up IT security, high-tech firewalls, robust encryption algorithms, and advanced threat ...