lock the back door

Preston, W. Curtis
October 2003
Storage Magazine;Oct2003, Vol. 2 Issue 8, p28
Discusses the importance of storage area network security. Elements of data security; Information on the denial of service attack; Protection of management interface.


Related Articles

  • WHAT YOUR BUSINESS SHOULD KNOW ABOUT INTERNET SECURITY. Mcguire, Brian L.; Roser, Sherry N. // Strategic Finance;Nov2000, Vol. 82 Issue 5, p50 

    The article focuses on the importance of Internet security for companies engaging in electronic commerce. A discussion is presented about the effects of failed Internet security on company finances and methods of identifying threats online. The development of a smart card for authorized access...

  • Holding Back the Hackers.  // SDM: Security Distributing & Marketing;Aug2004, Vol. 34 Issue 8, p39 

    Responds to an inquiry on how to protect computer systems from hackers. Reduction of potential for computer mischief; Steps to securing a computer network.

  • Out-of-touch IT chiefs leave apps wide open to hackers. Goodwin, Bill // Computer Weekly;9/22/2009, p10 

    The article discusses a study on computer security, published by U.S. security education and research body the Sans Institute and security suppliers Tippingpoint and Qualys. The study is the first to analyse systemically how cybercriminals are breaking into corporate systems. It draws on attack...

  • A different kind of hacking. Jackson, Donny // Urgent Communications Exclusive Insight;5/1/2011, p7 

    The article discusses the author's insight on the investment made in securing the computer network. He claims that when it comes to network security, many communications administrators first think of hackers, viruses and other software attacks that can compromise the integrity of information...

  • Ethical Hacker.  // Network Dictionary;2007, p182 

    A definition of the term "Ethical Hacker" is presented. It refers to a computer and network expert who attacks a security system on behalf of its owners. Such a hacker also seeks vulnerabilities that a malicious hacker could exploit. An ethical hacker, however, reports problems instead of taking...

  • Ethical Hacking.  // Network Dictionary;2007, p182 

    A definition of the term "Ethical Hacking" is presented. It refers to the process of testing the effectiveness of a computer security systems. Its other names include penetration testing, intrusion testing and red teaming. Ethical hacking is conducted by ethical hackers whose aim is to find...

  • It's not your site, it's programs that run your site. LeClair, Lee // Inside Tucson Business;4/17/2006, Vol. 15 Issue 45, p24 

    The article points out that computer security for businesses with working web sites is a continuing struggle that requires vigilance and care whether one is running PCs or servers. One must be careful as to how the web programs work when they communicate with customers. One should realize that...

  • bridging SAN islands. Wendt, Jerome M. // Storage Magazine;May2004, Vol. 3 Issue 3, p50 

    As storage networks grow and merge, performing routine tasks such as zoning, LUN security changes or installing a host bust adapter may unintentionally destroy data in the storage area network (SAN). To help insure that a change made to one part of the SAN does not wreak havoc throughout the...

  • FOSE event homes in on security. Carlson, Caron // eWeek;4/11/2005, Vol. 22 Issue 15, p28 

    The article focuses on FOSE conference and exhibition at the Washington Convention Center, Washington D.C. where the focus was information sharing among different companies in the U.S. Ever since the terrorist attacks of Sept. 11, 2001, the government has urged private enterprises to pass along...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics