Security Solution for a Bank Officer’s Laptop
UAE Bank provides laptops to their loans officers. The laptops contain information about all of the bank’s loans products (public information), and some other bank information (confidential information). The bank officer takes loan applications from clients (confidential information) and keeps these on the laptop. The loans officer travels to various locations to meet clients.
Since computer security has become important, almost all of the focus has been on securing large, multi-user machines. Moreover, for that purpose was the importance of some security procedures if the laptop were stolen or lost .
Data loss ...view middle of the document...
And to make sure that the computer has got a strong access control it should has the following security functions:
• Strong user authentication
• Control of user access per partition
• Support for user identification using dynamic passwords
• Secure remote assistance for users who are traveling and have forgotten their passwords
• Central configuration and administration
• Keyboard lock and screen saver for Windows95/98
• Limited number of logon attempts with automatic locking
• Audit logging of events, i.e. successful and failed logon attempts
And to have a safe access for the internet you should do the following:
| Completely close your system to all NetBIOS name and resource sharing leakage, and firmly shut the NetBIOS . |
| Cost nothing to implement, other than the time taken to read and understand these pages, and do not depend upon any external software. |
| Do not in any way disturb your current Windows or network logon procedures and do not disrupt your dial-up networking or other stored passwords. |
| Do not rely upon any "hacking tricks" or undocumented procedures. No warranties will be voided and no one can refuse to support your system on the grounds that you've done something "strange" to it. (You won't have.) |
| Create a solid foundation for establishing a secure local area network — today or tomorrow. When you have read and understood this page and the one that follows, you will have gained a solid understanding of the theoretical and practical aspects of network component binding. |
| Return CONTROL of a significant and important aspect of your personal computing experience — your computer's networking — back to YOU where it always belonged! |
In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event
67% of internet users have suffered serious data loss
A data repository model can be used to provide structure to the storage. Now there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.
Before data is sent to its storage...