The importance of a comprehensive security strategy in enterprise IT solutions
ثبت نشده
چکیده
............................................................................................................................................. 3 Introduction......................................................................................................................................... 3 Elements of security.............................................................................................................................. 5 HP security strategy.............................................................................................................................. 7 The security pyramid ............................................................................................................................ 7 Security infrastructure components and technologies ................................................................................ 9 Hardware ..................................................................................................................................... 10 Physical access devices............................................................................................................... 10 Acceleration hardware................................................................................................................ 10 Pre-operating system....................................................................................................................... 11 Software applications ..................................................................................................................... 11 BIOS options ............................................................................................................................. 11 Secure operating systems ............................................................................................................ 11 Virus scanners............................................................................................................................ 11 User education .............................................................................................................................. 11 Operating system........................................................................................................................... 11 User access and authentication technologies ..................................................................................... 12 Biometrics.................................................................................................................................. 12 Tokens ...................................................................................................................................... 12 Smartcards ................................................................................................................................ 13 System management....................................................................................................................... 13 Network considerations .................................................................................................................. 13 LANs ........................................................................................................................................ 14 RAS .......................................................................................................................................... 14 Wireless LAN ............................................................................................................................ 14 Broadband ................................................................................................................................ 14 Wireless telephony ..................................................................................................................... 14 Protocols ................................................................................................................................... 14 Professional services .......................................................................................................................... 15 Conclusion........................................................................................................................................ 15 Call to action .................................................................................................................................... 16
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملThe United States National Security Strategy under Bush and Obama: Continuity and Change
The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...
متن کاملUnified Security Architecture for enterprise network security
to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...
متن کاملEnterprise Resource Planning and Business Intelligence: The Importance of Integration
The advancement of information and communications technologies (ICT) has significantly intensified market competition the world over. One of the most widespread solutions is the use of enterprise resource planning systems that has proved to support the integration and automation of the processes, the improvement of the performance, and the reduction of costs. ERP involves the planning and manag...
متن کاملTwo Comprehensive Strategies to Prioritize the Capacity Improvement Solutions in Railway Networks (Case Study: Iran)
The aim of this study is to present two comprehensive strategies for prioritizing the capacity improvement solutions in the railway networks. The solutions considered in this study include: promoting to double-track railways, block signaling system, electrification and re-opening the closed stations. The first strategy is based on a local approach, which concentrates on the critical block secti...
متن کامل