Redundant array of independent nodes (RAIN) is a disk subsystem that provides distributed data storage and protection in network architecture by integrating inexpensive hardware and management software. RAIN is designed to offer scalable and reliable network-attached storage (NAS) by combining off-the-shelf distributed computing and commodity...
The evolution of computer networks has made the sharing of information ever more prevalent. Information is now exchanged at the rate of trillions of bytes per millisecond, daily numbers that might extend beyond comprehension or available nomenclature. A proportion of that data is not intended for sharing beyond a limited group and much data is protected by law or intellectual property. An information security policy endeavors to enact those protections and limit the distribution of data not in the public domain to authorized recipients.
Every organization needs to protect its data and also control how it should be distributed both within and without the organizational boundaries. This may mean that information may have to be encrypted, authorized through a third party or institution and may have restrictions placed on its ditstribution with reference to a classification system laid out in the information security policy.
An example of the use of an information security policy might be in a data storage facility which stores database records on behalf of medical facilities. These records are sensitive and cannot be shared, under penalty of law, with any unauthorized recipient whether a real person or another device. An information security policy would be enabled within the software that the facility uses to manage the data they are responsible for. In addition, workers would generally be contractually bound to comply with such a policy and would have to have sight of it prior to operating the data management software.
A business might employ an information security policy to protect its digital assets and intellectual rights in efforts to prevent theft of industrial secrets and information that could benefit competitors.
A typical security policy might be hierarchical and apply differently depending on whom they apply to. For example, the secretarial staff who type all the communications of an organization are usually bound never to share any information unlesss explicitly authorized, whereby a more senior manager may be deemed authoritative enough to decide what information produced by the secretaries can be shared, and to who, so they are not bound by the same information security policy terms. To cover the whole organization therefore, information security policies frequently contain different specifications depending upon the authoritative status of the persons they apply to.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: