官术网_书友最值得收藏!

Physical vulnerabilities

Physical vulnerabilities include any weak links between the outside and the server equipment within the facility belonging to the customer. Vulnerabilities can mean the existence of the threats mentioned in the previous section, most notably weak authentication and questionable personnel.

Vulnerability such as a poor location or inadequate power grid should be immediately remediated by moving equipment to another facility without said vulnerabilities. Additional vulnerabilities that need to be considered include any aspect of the facility that will lend itself to a single point of failure, including the lack of redundant power or redundant Internet connections. Commercial datacenters are usually happy to showcase their redundancy.

As with all the threats and vulnerabilities mentioned in the previous sections, a detailed plan and checklist should be used when evaluating the design and implementation of each of these parts that make up a secure infrastructure. Adequate disaster recovery planning is also key as well as ensuring data security during a disaster. Confirm that should a disaster occur, the data will be secure at the disaster recovery website or websites.

主站蜘蛛池模板: 灵石县| 丹东市| 温州市| 秭归县| 象山县| 万盛区| 沅江市| 上林县| 宝坻区| 永吉县| 郯城县| 汝阳县| 社会| 新源县| 阳曲县| 福鼎市| 吉林市| 于都县| 壶关县| 怀仁县| 汉沽区| 施甸县| 襄城县| 宕昌县| 新田县| 万荣县| 宜州市| 淮安市| 林口县| 无锡市| 松江区| 兴城市| 治县。| 汶上县| 白玉县| 民县| 水富县| 元朗区| 峨眉山市| 若羌县| 龙山县|