Portal:Information Security
From Wikibon
Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.
WikitipRFID for storage mediaWhile the physics of miniaturization have changed all computing devices in the data center, the security-related consequences of smaller and faster are especially problematic for storage media. Tagging and labeling drives, tapes, and other removable media remain necessary for asset management and location, but are hardly sufficient for security. Software that audits change, move, and copy at the bit level is essential to securing storage, but provides minimal help when the data stays on a particular media, but the media moves. RFID technology, in conjunction with the most modern processes for managing package logistics, should be added to the domain of storage media management. Some specialty storage vendors serving specific IT verticals (e.g., health care) are beginning to offer embedded RFID capability. However, to improve storage media tracking, users should start pushing suppliers for RFID-enhanced media across the board. As bit densities increase, it's a design trade-off that makes enormous sense to any business concerned about data moving by foot.
Footnotes: |
Featured ResearchData encryption strategiesAs the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network. |
|
Featured How-to Note |
Implementing storage network securityIn the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems. |