Network Security and Management

by Professor Brijendra Singh.

Saturday, 24 February 2018

Data Warehouse control and security

DATA WAREHOUSE CONTROL AND SECURITY Data Warehouse (DW) is a collection of integrated databases designed to support managerial decision-making and problem-solving functions. It contains both highly detailed and  summarized historical data relating to various categories, subjects or areas. All units of data are relevant to appropriate time horizons. DW is an integral part of enterprise—wide decision support system, does not ordinarily involve data updating. It empowers and end users perform data access and analysis. This...

Monday, 5 February 2018

Goals of Security Infrastructure

Goals of Security Infrastructure The primary goal of a security infrastructure design in the protection of corporate assets. The way we protect these assets is by the proper deployment of security components into an organized and cohesive security infrastructure. Assets may include hardware, software, network components and intellectual property. The controls applied in a protection of these assets should be in line with your corporate security goals as well as your corporate security policy documentation. Though only the protection of data...

Building security Plan

Building Security Plan The basic goals of a network security system are pretty much like the security goals for any kind of computer system. To protect information from accidental destruction or modification. To protect information from deliberate destruction or modification. Make sure the data is available to authorized users, when they need it and in a form they can use. To secure a network system, you will need nearly as much diplomatic sense is technical know-how. For example, you will have to influence people in client department...

Security Procedures

Security Procedures The best physical and technical methods are of little value if your employees do not use them properly. More important you can use procedural methods to conduct your overall business operations. At the same time, you can minimize the degree to which security measures interface with full, productive use of your computers. Procedural security is a set of management and supervisory controls. It includes rules for the use of computers and data, and ways to detect unauthorized use. Data input Data processing Program development Output Communication Storage. Procedural...

Organizational Policy, Security and Infrastructure

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: justify; font: 12.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} p.p2 {margin: 0.0px 0.0px 12.0px 0.0px; text-align: justify; font: 12.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} span.s1 {font-kerning: none} span.s2 {font: 12.0px 'Trebuchet MS'; font-kerning: none} span.Apple-tab-span {white-space:pre} Organisation Policy, Security and Infrastructure Today, A good manager will know the types and forms of information generated and how...