Aug 25 2011
Secure desktop configuration is defense in depth strategy for any organization is an important part. But in the plan include security of Microsoft Office 2010 desktop configurations, you must understand with Office 2010-related security risks and threats, and then determine which of these security risks and threats to the organization’s business assets or a business process risk. Must also determine what privacy risks and threats to users’ personal information and private information risk.
Information security risks
Most IT professionals and IT security specialists to information security risks fall into three categories:
• security risk because unauthorized users and malicious code attempts to access in the organization of the talk, write and create content, these risks will pose a threat to the organization’s intellectual property rights.
• integrity of the risks due to unauthorized users and malicious code will attempt to destroy the organization depends on business data, these risks will pose a threat to business resources. Risk of endangering the integrity of critical information including the organization of any business assets, such as database servers, data files and e-mail server.
• availability of risk due to unauthorized users and malicious code will attempt to destroy your way of doing business, and information the way the staff work done, these risks will pose a threat to business processes. Business intelligence processes, applications, features and functionality, and document workflow processes may be the availability of risks.
To help ensure that your organization does not suffer from the threat of the three types of risk, we recommend using defense in depth security strategy; that included a multi-overlap defense against unauthorized users to malicious code and security policy. Defense layer typically includes:
• perimeter network protection, such as firewalls and proxy servers.
• physical security measures, such as physical security of data centers and server rooms.
• Desktop security tools, such as personal firewalls, virus scanners and spyware detection.
If Office 2010 is part of the organizational environment, the defense in depth strategy must also include the Office 2010 together with mechanisms to provide mitigation. Mitigation mechanisms, including many technical, settings and features. Use of these mechanisms help to alleviate the threat of Office 2010 applications, and protect intellectual property in the heart of the company, business resources and business processes.
Office 2010 security model can help organizations mitigate the risk of all three. However, every organization has different infrastructure capabilities, the efficiency of different production requirements and different desktop security requirements. To determine the organization mitigate these business risks of the exact way you need to assess the threat of use of these risks and threat agents.
microsoft office 2007 Microsoft office 2010 Microsoft office 2010 doanload Microsoft office 2010 download Microsoft office 2010 dpwnload Microsoft office 2010 Key office 2007 Office 2007 download office 2007 skill office 2010 office 2010 download Office 2010 key office 2010 skill office 2010 technology outlook 2010
Leave a Reply
You must be logged in to post a comment.