Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
 
(23 intermediate revisions not shown)
Line 1: Line 1:
-
__NOTOC__
+
<!--|body|-->__NOTOC__
-
 
+
'''Welcome to the Wikibon Information Security Portal.'''  
'''Welcome to the Wikibon Information Security Portal.'''  
-
The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.  
+
 
 +
The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.
 +
 
 +
The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the [http://wikibon.org/wiki/v/2010_Information_Security_Agenda Information Security Agenda: 2010]- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.
{|
{|
|+
|+
Line 14: Line 16:
[[Image:Data_Encryption.jpg|250px]]
[[Image:Data_Encryption.jpg|250px]]
-
====[[Data encryption strategies]]====
+
==[[Data encryption strategies|Data Encryption Strategies]]==
-
<p style="color: #666;">...Glenn Street, senior database specialist with Copyright Clearance Center, shares with us some insights about being, or becoming, a database administrator (DBA): Q: What’s the nutshell description of a DBA? </p>
+
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
-
[[Question and answer about DBAs|read more...]]
+
[[Data encryption strategies|read more...]]
| valign="top" |
| valign="top" |
-
{{Information Security Professional Alerts}}
+
{{Information Security professional alerts}}
|+
|+
| valign="top" |
| valign="top" |
-
===Featured Success Story===
+
===Featured How-to Note===
 +
[[Image:Storage_Security.jpg|left|250px]]
|
|
 +
==[[Implementing storage network security|Implementing Storage Network Security]]==
 +
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems. 
 +
</p>
 +
[[Implementing storage network security | read more...]]<!--|body|-->
 +
 +
'''Action Item: <!--|actionitem|--><!--|actionitem|-->
-
|}
+
''Footnotes: <!--|footnotes|--><!--|footnotes|-->
-
[[Category:Careers]][[Category: Careers wikitips]][[Category: Information Management wikitips]][[Category: Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: TreeTop Technologies]][[Category: Wikitips]]
+
[[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Professional alerts]][[Category: Security]][[Category: Storage]][[Category: Storage asset management]][[Category: Storage professional alerts]][[Category: Storage security]][[Category: Wikitips]]

Current revision as of 20:03, 14 April 2011


Welcome to the Wikibon Information Security Portal.

The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.

The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the Information Security Agenda: 2010- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.

Wikitip

Portal:Information Security

Welcome to the Wikibon Information Security Portal.

The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.

The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the Information Security Agenda: 2010- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.

Wikitip

Portal:Mobile Enterprise

The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles. Best Investment | Managed Funds | Mutual Funds Australia

>>Join our Group >>Become a Fan >>Follow @Wikibon >>Read the Blog

Wikitip

Mobile platforms bring unique security challenges

IT must step up to the security issues of mobile computing. Laptops and high-end smartphones in particular are a major target for theft, and while most thieves are just after the device, which they wipe clean and fence, some may be sophisticated enough to realize that the information on them, and the access to corporate information through them, is often much more valuable to competitors than the phone itself. Wherever possible users should be discouraged from saving sensitive information on laptop hard drives and required instead to access that information only through secure network connections. Good password practices, including changing passwords periodically, should be enforced. Every mobile employee should have an electronic wallet on his device where he can store all his passwords under strong encryption, giving him only one password that he needs to remember and eliminating the common practice of jotting passwords down on a slip of paper kept in the wallet or of using obvious passwords such as a child's birth date. And devices themselves should be equipped with a strong, password-activated locking system that encrypts all sensitive data. Really sensitive data should be double encrypted – once in the application and a second time by the device locking system. Of course none of this is perfect, but if it becomes more expensive to crack the codes than the information is worth, then the information on the device, if not the device itself, can be deemed reasonably secure.

View Another Wikitip

Browse all Mobile Enterprise Wikitips

Featured Case Study

Safeguarding Enterprise Voice Communication over WiFi

Enterprises are showing a strong interest on wireless voice technology over the standard WiFi networks for its attractive features such as lower phone bills, centralized management, or fast deployments. However these wireless voice networks are susceptible to usual attacks like viruses, spam, phishing, hacking, stolen data, denial of service (DoS), voice injections, man in the middle attacks, call hijacking, eavesdropping etc. The security of these networks become a major concern for enterprises because IT managers have no or very little knowledge how to protect voice networks.

read more...

Mobile Enterprise Professional Alerts


Featured How-To Note


Architecting Wireless Email

Wireless email is an important business tool for today's enterprises and an entrepreneurial solution to maximize the employees’ business potential and gain a competitive edge. Since businesses now send as much as 60% of their business-critical data via email, accessing emails wirelessly means business success for many organizations by providing rapid customer communication, faster decision-making and collaboration from distant places.

read more...

Action Item: Aksesoris Mobil | Florist Jakarta | Railing Tangga | Rental Forklift

Footnotes:

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Template:Information Security professional alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Template:Information Security professional alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

Personal tools