2011年5月12日星期四

Human Behavior- A Critical Security Threat_3835

Human Behavior: A Critical Security Threat

Whichever way one looks at network and data security hp pavilion dv6000 Battery, one of the most critical security vulnerabilities facing small and medium sized businesses is human behavior.

Human beings and their actions within an organization are often overlooked when administrators are handling the security of their network and their most important asset, data.

IT administrators in SMEs are often overworked and required to do tasks that an administrator in a large business would never dream of doing. Although they make every cheap effort to secure the network and the organization’s lifeblood, very often their efforts do not always adequately cover the weakest link: those who replacement use the system and have access to the data.

And this is a major problem because many security breaches occur not because the system was shop hacked by external sources but simply because an employee did something that compromised the IT administrator’s efforts to protect the network.

cheap

This is why it is so important that administrators pay close attention to those who are allowed to access the network and what they are charger allowed to do with it. Unfortunately, where human behavior is concerned, basic security steps are often neglected or not given enough attention. gateway Here are a few:

1. Failure to implement the principle of least privilege

Giving administrator rights on employee machines or full, new unaccountable access to all data at share and file-level is a serious security risk. While the concept of least privilege is the best course of store action HP Pavilion DV6 Battery, it is not always possible as limitations in the system will then be your worst enemy (and administrators already have enough on their compaq place). For example Dell Inspiron E1705 Battery, Windows XP with least privilege implemented is a nightmare to administer and use.

2. Controlling the use of portable discount devices on the network

Endpoint security is often overlooked by administrators who fail to realize that the USB sticks or iPods employees acer aspire bring to work every day are a perfect tool to copy data to or from the network. In a worst case scenario, a ‘trusted’ but ‘disgruntled’ employee zxcsky09520 can bypass encryption, copy huge amounts of data or upload malicious software Dell Inspiron 1520 Battery, effectively bringing the network down or deleting important data.

没有评论:

发表评论