![]() ![]() Hardening is about minimizing risk and increasing robustness. Your legal department probably has some suggestions for you on that front. In addition to opening yourself up to data theft, data loss, and general mayhem,Īny system misused to attack other systems opens possible exposure to liability. ![]() Some people do this intentionally on certain systems, known as honeypots, thatĪre part of an Intrusion Detection System. So what does each level of security entail? What is the right mix of levelsįor you and your userbase? These next few paragraphs will attempt to help answer Absolute security tends to clash with ease of use. That level of security isn't convenient for the normal computing needs Some computer systems warrant such security, and get it. Is to disconnect it from the network, from all removable media devices, andįrom the printer, remove all I/O ports, and lock it in a secured room with a How much security do you need? The only way to obtain a fully secure system
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |