Adsons

    Data Security Debacle

    Date02 Jun 2004
    3829
    Posted ByLinuxSecurity Advisories
    Anything short of keeping a computer locked in a room with no network connection represents a security risk. From the moment the device is plugged in and connected to a network, you begin to trade security for functionality. It's always a balancing act, and one that requires you to determine how much functionality you are willing to sacrifice for increased security or vice versa. "Wireless, remote access and outsourcing solutions present many key barriers to security and, if not managed correctly, can expose a corporate network to unlawful intrusion. These threats, however, can be avoided if the proper precautions are taken," says Wreski. . . . There is a saying in IT that the only truly secure computer is one that's turned off. Because this isn't practical or feasible, data security becomes yet another unavoidable part of doing business in today's wired world. Simply put, data security is the protection of data from unauthorized, accidental, or deliberate modification, destruction, or disclosure.

    Because security is a process, not a product, it is principally an individual responsibility. No amount of regulation can ensure security without individual cooperation. Organizations today must not only protect their data from internal harm, but from harm within the myriad networks to which it is connected. The scope of those networks has resulted in the largest number of potential security holes to date. They include threats to wired and wireless networks via attacks by hackers and by new virus types.

    Comments powered by CComment

    Sidebar Ad

    LinuxSecurity Poll

    What type of mobile phone do you have?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote
    4
    radio
    [{"id":"16","title":"iPhone","votes":"8","type":"x","order":"1","pct":24.24,"resources":[]},{"id":"17","title":"Android","votes":"22","type":"x","order":"2","pct":66.67,"resources":[]},{"id":"18","title":"Other","votes":"3","type":"x","order":"3","pct":9.09,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories