官术网_书友最值得收藏!

Physical vulnerabilities

Physical vulnerabilities include any weak links between the outside and the server equipment within the facility belonging to the customer. Vulnerabilities can mean the existence of the threats mentioned in the previous section, most notably weak authentication and questionable personnel.

Vulnerability such as a poor location or inadequate power grid should be immediately remediated by moving equipment to another facility without said vulnerabilities. Additional vulnerabilities that need to be considered include any aspect of the facility that will lend itself to a single point of failure, including the lack of redundant power or redundant Internet connections. Commercial datacenters are usually happy to showcase their redundancy.

As with all the threats and vulnerabilities mentioned in the previous sections, a detailed plan and checklist should be used when evaluating the design and implementation of each of these parts that make up a secure infrastructure. Adequate disaster recovery planning is also key as well as ensuring data security during a disaster. Confirm that should a disaster occur, the data will be secure at the disaster recovery website or websites.

主站蜘蛛池模板: 龙井市| 泽普县| 屏边| 宁德市| 凌海市| 镇坪县| 高雄县| 肃宁县| 新河县| 海晏县| 蓬溪县| 大余县| 九台市| 滦南县| 雷波县| 茌平县| 昌吉市| 濮阳县| 滦平县| 芷江| 昭平县| 伊宁市| 长治县| 乳山市| 建瓯市| 榆中县| 临猗县| 武宣县| 安丘市| 浠水县| 习水县| 焦作市| 郴州市| 渝北区| 红原县| 宣恩县| 津市市| 雅安市| 丰宁| 锡林郭勒盟| 兴安县|