TITLE

Out of sight -- out of mind

AUTHOR(S)
Tyler, Geoff
PUB. DATE
October 2004
SOURCE
Management Services;Oct2004, Vol. 48 Issue 10, p24
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article highlights measures taken by the storage sector of the information technology (IT) industry to improve security and data access as of October 2004. The virus crisis has encouraged IT administrators to wrongly believe that security equals anti-virus protection. IT security should be about protecting all critical systems, processes, and data. It is advised that companies carry out risk analysis covering the entire IT environment, quantified in terms of the business processes affected, and their importance. Indeed it may turn out that hackers have exploited this gap in vigilance to launch other, more costly, kinds of intrusion. The IT industry and its associated consultants and prophets are now more or less agreed that with virus and firewall protection so well engineered these days--and now becoming at last more widely adopted by organizations--if not by individuals--the main risk is once again loss of or illicit access to our stored knowledge. Storage technologies have reached the point where it is a major IT research exercise to determine the best--or best combination. Acronyms and names abound--LTO, DVD, CD-R, DLT, SDLT, RAID, WORM, AIT, 3480, Mammoth, and UD0 only scratch the surface. They encompass hard disk, tape and optical disk storage media, fixed and removable and may involve a migration from one to the other as access levels and acceptable retrieval times drop over the years.
ACCESSION #
14696651

 

Related Articles

  • OVERCOMING OBSTACLES. Shumard, Craig; Beaulieu, Serge // Information Security;Nov2011, Vol. 13 Issue 9, p35 

    The article discusses the importance of improving the risk assessment program to ensure implementation of necessary security controls. According to the author, risk assessments, regardless of methodology used, are fundamentally subjective exercises with its results dependent on factors including...

  • The enemy in the pocket. Ahlberg, Magnus // Intermedia (0309118X);Apr2005, Vol. 33 Issue 2, p24 

    The article reports that portable data storage devices like MP3 players and USB memory sticks are revolutionising consumer electronics but they are also an enormous threat to data protection. The rise of the mobile data market has been rapid, lucrative and dangerous. Long gone are the days when...

  • A survey of recent advances in optical and multimedia information technologies. Jessop, Deborah // Computers in Libraries;Feb97, Vol. 17 Issue 2, p53 

    Surveys advancements made in information technology in 1996 and highlights several developments emerging in 1997. Recordable CD-ROMs or CD-R; Rewritable CD-ROMs or CD-ReWritable; Cable modems to improve bandwidth for Internet access; Integrated Services Digital Network (ISDN) and Asymmetric...

  • Laptop loss: This time it was Starbucks. Connor, Deni // Network World;11/13/2006, Vol. 23 Issue 44, p14 

    The article reports on the need for data protection for devices such as laptops and universal serial bus flash drives in the U.S. The need for data protection has been driven by numerous cases of high-profile data loss inflicted to business enterprise such as in the case of coffee shop chain...

  • Risk and Protection of Medical Information Systems.  // Electronics & Electrical Engineering;2010, Issue 105, p109 

    No abstract available.

  • The Great Cipher Mightier Than The Sword. Saini, Shumpy // PC Quest;Apr2012, p104 

    Information about annual RSA Conference themed "The great cipher mightier than the sword," held March 2012 on the information security issues in exercise is presented. Topics include the solution will include strong user authentication, identity federation and dynamic risk assessment based on...

  • Establishing a Solid Security Foundation.  // CIO Insight;Mar2004, Issue 37, p76 

    This article presents five basic steps in managing enterprise security. Vulnerability assessment demands a multidisciplinary approach, especially because risk analysis shapes every subsequent aspect of an information technology security process. Every aspect of software availability must be...

  • Security action plan. Bronson, Gary // eWeek;6/23/2003, Vol. 20 Issue 25, p49 

    People want to use secure products, but building an environment where data is safe means ongoing diligence, both in the use of technical best practices and in confronting social engineering threats through changes in individual and group behavior. With this in mind, the author decided to...

  • New Products.  // Information Today;Oct1984, Vol. 1 Issue 9, p18 

    This article presents several products related to information technology introduced in the U.S. market in October 1984. Reference Technology Inc. has burst onto the information industry scene with slick presentations of a new laser optic system that delivers vast-volume data to desktop...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics