EditedSecurityx - Business and Computer Science

snakesailboatΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 7 μήνες)

179 εμφανίσεις

SECURITY STRATEGIES

A
s the Internet has evolved and computer technology has become more sophisticated, IT managers,
computer experts, and security specialists have developed a set of security strategies to prevent
damage and losses. These strategies
include the following:



Data backups



Disaster recovery plan



Data encryption



Firewalls



User IDs and passwords



Network sniffers



Biometric authentication



Virus detection and removal

DATA BACKUPS

One of the crucial elements of any prevention scheme is to be pre
pared for the worst. What if a fire
destroyed your company’s offices and computers? Do all employees have recent backups on hand to
replace critical files? Backing up data and placing the backup in a safe location is a necessary chore
because if antivirus
software misses a bug or if a disaster occurs, you do not want to be left with
nothing.

Organizations can choose from many backup schemes. Besides the obvious move of having a
complete copy of programs and data in a safe place, companies tend to take addit
ional measures,
particularly concerning a primary database. If something goes wrong with the backup, a company
could find itself out of business quickly. Organizations normally keep more than one backup of
important databases and usually update them daily
or weekly.

A variation of the backup strategy is to create rotating backups of perhaps seven copies of company
data, one for each day of the week. When it comes around to the eighth day, the administrator takes
the previous backup and overwrites it, saving

the new backup and erasing the oldest copy. This
scheme has several advantages. It saves time, as only one backup is made each day. It allows for
multiple disasters to strike simultaneously, as you always have the original and seven copies of the
data ava
ilable. If the database is lost or corrupted, many copies exist, some of which may predate
the beginning of the problem.

DISASTER RECOVERY PL
AN

A disaster recovery plan is a safety system that allows a company to restore its systems after a
complete loss o
f data. The elements of a typical disaster recovery plan include the following:



Data backup procedures



Remotely located backup copies



Redundant systems

Besides backing up the data multiple times and storing backup copies in a different building, other
prec
autions can be a big benefit when things go wrong. These precautions include keeping extra
pieces of critical hardware that can be quickly replaced in the damaged machines. Another
safeguard is establishing redundant systems. One part of a redundant system

might include having
a fully mirrored hard drive that can be swapped with a damaged or corrupted hard drive thereby
keeping downtime to a minimum. A mirrored hard drive is one that contains exactly the same data
as the original and is updated automaticall
y every time the original is updated. If one disk fails, the
other can keep going with no loss of data. Many corporations have safeguards of this type to protect
critical databases.

DATA ENCRYPTION

To prevent people from spying on sensitive transactions, s
uch as the transmission of a user name
and password across the Internet, companies use data encryption to scramble the information
before it is transmitted. Data encryption schemes include an encryption key that is generated
automatically and shared betwee
n the two computers that wish to communicate. This security can
also work with cell phones and other forms of communication devices. Without this key, breaking
the encryption code is very difficult.