Architecting for Data Security

Tuesday Dec 5th 2006 by DatabaseJournal.com Staff
Share:

IT pros must understand and address the liability associated with granting unfettered access to sensitive data. We explore methods for safeguarding private information while keeping it usable for applications.

[From Network Computing]

Let' Face It: We design our systems to make it easy for users to access information. And we pay much more attention to simplifying access than to ensuring that only authorized users have it.

But companies are now waking up to the fact that the value of their business is inextricably tied to the information in their core systems. And that information can leak out of core systems in much the same way water can leak out of a water heater with a two-inch hole. That is to say, quickly and in large volumes.

The article continues at http://www.networkcomputing.com/channels/security/showArticle.jhtml;jsessionid=51G3CCX1J21HUQSNDLPSKH0CJUNN2JVN?articleID=196513825

Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved