Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 14: Line 14:
[[Image:Data_Encryption.jpg|250px]]
[[Image:Data_Encryption.jpg|250px]]
-
====[[Data encryption strategies|Data Encryption Strategies]]====
+
===[[Data encryption strategies|Data Encryption Strategies]]===
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
[[Data encryption strategies|read more...]]
[[Data encryption strategies|read more...]]

Revision as of 03:59, 30 September 2009


Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.

Wikitip

Portal:Mobile Enterprise

The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles. Best Investment | Managed Funds | Mutual Funds Australia

>>Join our Group >>Become a Fan >>Follow @Wikibon >>Read the Blog

Wikitip

Portal:Storage

The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles.


Latest Information Storage Research


>>Join our Group >>Become a Fan >>Follow @Wikibon >>Read the Blog

Wikitip

Executive Primer: A Peer Incite tool

One of the key deliverables from a Wikibon Peer Incite call are the research notes which are posted to the wiki and distributed in a newsletter. One of the deliverables is an "Executive Primer" otherwise known as "The 12 things you need to know to be considered an expert on xxxxx".

Why the Executive Primer

CIOs and other IT practitioners are expected to be familiar with a broad spectrum of technologies, often leveraging tools such as Wikipedia and trade journals to try to keep up with the latest and greatest. Peer Incite calls are an excellent way to gain an in-depth understanding of a topic; the Executive Primer will be a community-developed wiki document that captures the pertinent information in a list. With the knowledge gained from a short list of twelve (12) items, most people will consider you an expert on the topic. Why 12? It is more in-depth than a top 10 and isn't meant to be an exhaustive list (also see the Rule of Twelve from Scott Adams).

Creating the Executive Primer

The creation of an Executive Primer will begin at the end of a Peer Incite call. The community will be asked to sum up the topic in a single sentence. Questions will then be raised to discuss other key takeaways, adjacent areas of relevance, players in the marketplace and other relevant terms. One of the members of the Peer Incite panel or a volunteering community member will start the wiki document. The title of the document should be "Executive Primer: Technology X". The categories of the entry should include both "Peer Incite" and "Executive Primer". The body of the document should be a list of 12 statements. In addition to the list of 12, there should be a "See Also" section at the end which can reference the other Peer Incite articles and other papers, blogs and websites where additional details on the topic can be learned. If needed, an "Additional Considerations" section can be included for things that fall out of the list or are under debate. Like any other wiki entry, additions and subtractions can be done at any time and the community should reach consensus as to the proper contents of the list (relevance rather than order should be the primary concern).

View Another Wikitip

Featured Case Study

Virtualization Energizes Cal State University

John Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years.

read more...

Storage Professional Alerts


Featured How-To Note

Storage Virtualization Design and Deployment

A main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center.

read more...

View Another Wikitip

Browse all Mobile Enterprise Wikitips

Featured Case Study

Safeguarding Enterprise Voice Communication over WiFi

Enterprises are showing a strong interest on wireless voice technology over the standard WiFi networks for its attractive features such as lower phone bills, centralized management, or fast deployments. However these wireless voice networks are susceptible to usual attacks like viruses, spam, phishing, hacking, stolen data, denial of service (DoS), voice injections, man in the middle attacks, call hijacking, eavesdropping etc. The security of these networks become a major concern for enterprises because IT managers have no or very little knowledge how to protect voice networks.

read more...

Mobile Enterprise Professional Alerts


Featured How-To Note


Architecting Wireless Email

Wireless email is an important business tool for today's enterprises and an entrepreneurial solution to maximize the employees’ business potential and gain a competitive edge. Since businesses now send as much as 60% of their business-critical data via email, accessing emails wirelessly means business success for many organizations by providing rapid customer communication, faster decision-making and collaboration from distant places.

read more...

Action Item: Aksesoris Mobil | Florist Jakarta | Railing Tangga | Rental Forklift

Footnotes:

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Information Security Professional Alerts


Browse all Information Security Professional Alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Personal tools