It is said that if
you know your enemies and know yourself, you will not be imperiled in a hundred
battles; if you do not know your enemies but do know yourself, you will win one
and lose one; if you do not know your enemies nor yourself, you will be
imperiled in every single battle.
Sun Tzu Chinese
General and Strategist.
Security begins with education, knowing the dangers of your
enemy and the really bad people that exist in this world to get what you got.
The secondary part of security begins with the physical aspect of server
security. You must ensure that servers are warehoused in a sheltered locale
that unsanctioned individuals are not able to access. A
firewall for instance does more than stop "fire." It is a software program or carefully crafted hardware program that protects computers by permitting
applicable network traffic through the system while denying traffic it deems as
haphazard. It is the checkpoint security
guard that sifts and regulates the packets of data and their configurations.
When an individual utilizes Active Directory on a company
network, it is in control of two perilous security functions: authentication
and authorization. Computers use several set of complicated algorithms and bit
oriented security protocols to safeguard data that is stored and transferred
over a network.
Have a great week.

No comments:
Post a Comment