The importance of a comprehensive security strategy in enterprise IT solutions

ثبت نشده
چکیده

............................................................................................................................................. 3 Introduction......................................................................................................................................... 3 Elements of security.............................................................................................................................. 5 HP security strategy.............................................................................................................................. 7 The security pyramid ............................................................................................................................ 7 Security infrastructure components and technologies ................................................................................ 9 Hardware ..................................................................................................................................... 10 Physical access devices............................................................................................................... 10 Acceleration hardware................................................................................................................ 10 Pre-operating system....................................................................................................................... 11 Software applications ..................................................................................................................... 11 BIOS options ............................................................................................................................. 11 Secure operating systems ............................................................................................................ 11 Virus scanners............................................................................................................................ 11 User education .............................................................................................................................. 11 Operating system........................................................................................................................... 11 User access and authentication technologies ..................................................................................... 12 Biometrics.................................................................................................................................. 12 Tokens ...................................................................................................................................... 12 Smartcards ................................................................................................................................ 13 System management....................................................................................................................... 13 Network considerations .................................................................................................................. 13 LANs ........................................................................................................................................ 14 RAS .......................................................................................................................................... 14 Wireless LAN ............................................................................................................................ 14 Broadband ................................................................................................................................ 14 Wireless telephony ..................................................................................................................... 14 Protocols ................................................................................................................................... 14 Professional services .......................................................................................................................... 15 Conclusion........................................................................................................................................ 15 Call to action .................................................................................................................................... 16

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

The United States National Security Strategy under Bush and Obama: Continuity and Change

The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...

متن کامل

Unified Security Architecture for enterprise network security

to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...

متن کامل

Enterprise Resource Planning and Business Intelligence: The Importance of Integration

The advancement of information and communications technologies (ICT) has significantly intensified market competition the world over. One of the most widespread solutions is the use of enterprise resource planning systems that has proved to support the integration and automation of the processes, the improvement of the performance, and the reduction of costs. ERP involves the planning and manag...

متن کامل

Two Comprehensive Strategies to Prioritize the Capacity Improvement Solutions in Railway Networks (Case Study: Iran)

The aim of this study is to present two comprehensive strategies for prioritizing the capacity improvement solutions in the railway networks. The solutions considered in this study include: promoting to double-track railways, block signaling system, electrification and re-opening the closed stations. The first strategy is based on a local approach, which concentrates on the critical block secti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005