(i) Internal Threats
Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal emplyees or workers can change their tune and turn malicious, wreaking havoc on the computing environment.
Scrutinizing the workers backgrounds references and previous employers carefully and changing and auditing security methods especially observation of the work pattern or behaviour of the employees. It would be possible to know about the possibilities of internal threats before hand.
(ii) External Threats
External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated technology a number of new threats have also developed. It becomes difficults to know when an outsider will attempt to hack down the systems.
Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the security breaches before connecting to the Internet. One of the simplest and crudest methods could be that too manysystem administrators connect to the intranet first assuming that Internet should be treated as the ptentially hostile environment and consider security at a later stage. This method could be highly useful in detecting possible loopholes in the system before hand.
Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal emplyees or workers can change their tune and turn malicious, wreaking havoc on the computing environment.
Scrutinizing the workers backgrounds references and previous employers carefully and changing and auditing security methods especially observation of the work pattern or behaviour of the employees. It would be possible to know about the possibilities of internal threats before hand.
(ii) External Threats
External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated technology a number of new threats have also developed. It becomes difficults to know when an outsider will attempt to hack down the systems.
Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the security breaches before connecting to the Internet. One of the simplest and crudest methods could be that too manysystem administrators connect to the intranet first assuming that Internet should be treated as the ptentially hostile environment and consider security at a later stage. This method could be highly useful in detecting possible loopholes in the system before hand.
0 comments:
Post a comment