Skip to main content

Home/ IMT122 OUA Group/ Group items tagged Security

Rss Feed Group items tagged

Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
Joanne S

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

What is Cloud Computing and How will it Affect Libraries? | TechSoup for Libraries - 0 views

  • If you’ve used any of the popular Web 2.0 services over the past few years (e.g. Gmail, Wikipedia, Flickr or Twitter), you already have some experience with cloud computing
  • Like water and electricity, a computing cloud is a communally-shared resource that you lease on a metered basis, paying for as little or as much as you need, when you need it
    • Joanne S
       
      Benefits-  Cost Savings, Flexibility and Innovation.
  • ...4 more annotations...
  • As individuals and members of organizations, we’re already choosing between desktop applications and cloud applications when it comes to e-mail, RSS, file storage, word processing and other simple applications. Sooner or later we’ll have to make this choice for mission-critical enterprise applications too
  • Libraries may soon be building and managing their own data centers.
  • For more practical, technical explanations of cloud computing, check out the Wikipedia article the Anatomy of Cloud Computing the MIT Technology Review Briefing on Cloud Computing.
  • For a discussion of problems and concerns about the digital cloud, read: How Secure is Cloud Computing? Security in the Ether Industry Challenges: The Standards Question
Joanne S

Egypt shows how easily Internet can be silenced - Technology & science - Security | NBC... - 0 views

  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
1 - 9 of 9
Showing 20 items per page