TAILIEUCHUNG - Balancing Social Networking with Network Security Objectives

We believe Congress should adopt a menu of voluntary incentives to encourage private companies to improve cybersecurity. Some incentives may have a cost and would have to be offset. Others do not. However, incentives should be largely voluntary, recognizing that most critical infrastructures are privately owned. Many of these incentives could also be utilized by companies that do not own critical infrastructures. We also have to recognize that different companies and sectors will need different incentives – one size does not fit all. Committees should evaluate incentives that will be effective within. | BlueOCoat Balancing Social Networking with Network Security Objectives October 2010 BlueOCoat Balancing Social Networking with Network Security Objectives in a Government Environment Social Networking is Here to Stay With the explosion of other options for social networking interaction and collaboration email has lost its position as the primary Internet-based communication tool. In fact The Wall Street Journal reported that there were more social networking accounts than Webmail accounts in 2009. Today users rely more on blogs tweets social networking posts and even video clip communications to enrich both personal and professional information exchange. Even businesses are leveraging social networking Email Vs Social Networking Users and other Web services to communicate with customers employees and partners. A recent survey found that 65 percent of the largest 100 international companies have active accounts on Twitter 54 percent have a Facebook fan page 50 percent have a YouTube channel and one-third have corporate blogs. One in five of major international businesses are actually using all four of these technologies. While these sites and services offer tremendous business benefits they also present serious risks that have to be managed. For instance they are often the target of malicious attacks due to their popularity. Video sites like YouTube consume tremendous amounts of bandwidth if they are not properly managed on the corporate network. And employees may intentionally or accidentally leak sensitive company data onto a social networking site breaches that can result in lost competitive information public relations headaches fines legal action and more. The good news is with the right security approach these consequences can be successfully avoided. Source Wall Street Journal3 2008 I Email I Social Networking 2009 1 BlueOCoat Balancing Social Networking with Network Security Objectives in a Government Environment Managing the .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.