Securing The Host And Data Research Paper

The bolt and straps can only be released with a key that authorized personnel control. However, the servers could still be tampered with. The primary suggestion would be to implement a policy that requires the server room to remained locked during business hours and only authorized personnel have access to the room. The three programs compared are Fidelis XPS, Code Green Content Inspector, and Palisade's Packet Sure.

Fidelis XPS

Code Green

Palisade Packet Sure

Price

$132,830.00

$30,000.00

$31,000.00

Performance: Catching Harmful Files

84.00%

90.00%

55.00%

Configuration

Difficult, used command post server setup

Simple with graphic interface

Simplest with setup wizard and walk through instructions

Finger Printing

Comes with its own program, and does not allow outside programs

Fingerprints all sorts of data and allows scenarios...

...

It only detected 55% of harmful files, which meant that almost half of the harmful files being transferred back and forth passed through without detection. Additionally, if a network administrator is not very savvy with computer reports, they will have difficulty harvesting and interpreting reports from Palisade, making it nearly impossible to detect exactly what was missing.
The primary weakness with Fidelis is its incompatibility with other programs. At some point, Fidelis will become more susceptible to hackers who would be able to easily access information using newer programs.

Cite this Document:

"Securing The Host And Data" (2012, May 29) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/securing-the-host-and-data-58365

"Securing The Host And Data" 29 May 2012. Web.18 April. 2024. <
https://www.paperdue.com/essay/securing-the-host-and-data-58365>

"Securing The Host And Data", 29 May 2012, Accessed.18 April. 2024,
https://www.paperdue.com/essay/securing-the-host-and-data-58365

Related Documents

Trusted Platform Module is a dedicated microprocessor that is designed to secure computer hardware. TPM secures hardware by integrating cryptographic keys into the computer devices. According to Potter (2009) the cryptographic keys are specific to the host system and they are used for authenticating the host systems hardware. Using hardware-based cryptography will ensure that all the information stored in the hardware is protected from any external software attacks. TPM security

Future of Data Storage in Computer Networks There are a number of problems facing the future of information technology including the fact that networks are increasingly asked to expand in order to accommodate more and more data. Many experts believe that such increases will mean two things; one that the networks will become increasingly secure, and two because of the security, the data contained on the network will become more difficult

The Cincom CRM system also has areas where the sales teams can also enter in total contract value and the total budget for a given initiative as well. Both internally gained financial information from within the customer and the reported financial results, more easily obtained if the customer is publicly held, go into deciding which customers are the most worth investing in over time. There are also analyses completed

Data in information systems allows for businesses to process various actions in a way that is seamless. If one imagines a business as a factory, many businesses main product is data. From hospitals to banks, data is created, stored, transferred, and viewed every single, work day. If this data is of poor quality, it may slow down a business’ processes. For example, a hospital’s medical records are still on paper

Data Management Systems
PAGES 16 WORDS 4416

Practice Fusion Strategic Planning Document: A Plan for Conversion, Integration, and Implementation of Electronic Health Records (EHR) in a Residential Care Facility Description of Institute The objective of this study is to examine the implementation of a new information technology data-management plan at a residential care facility for individuals with mental illness/mental retardation. This facility also provides day treatment and respite care. This will include a two-person practice for a Nurse Practitioner and a

Securing Virtual Machines
PAGES 3 WORDS 1016

Virtualized Server Security Virtualized servers are faced with similar security concerns as their physical counterparts. The only difference is that virtualized servers have other threats that are specific to virtualized machines. Virtualization is a new technology, and with any new technology, there are new threats and security concerns that will accompany it. When compared to its physical counterparts, virtualized servers are more prone to threats because they are clustered. If one