skip navigation
National Criminal Justice Reference Service
Login | Subscribe/Register | Manage Account | Shopping Cartshopping cart icon | Help | Contact Us | Home     
National Criminal Justice Reference Service
  Advanced Search
Search Help
     
| | | | |
place holder
Administered by the Office of Justice Programs U.S. Department of Justice Office of Justice Programs Seal National Criminal Justice Reference Service National Criminal Justice Reference Service Office of Justice Programs Seal National Criminal Justice Reference Service
Topics
A-Z Topics
Corrections
Courts
Crime
Crime Prevention
Drugs
Justice System
Juvenile Justice
Law Enforcement
Victims
Left Nav Bottom Line
Home / NCJRS Abstract

Publications
 

NCJRS Abstract


The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 121485  
Title: Layer Your LAN
Journal: Security Management  Volume:33  Issue:9  Dated:(September 1989)  Pages:201-205
Author(s): I S Hertzoff
Publication Date: 1989
Pages: 5
Type: Training Materials
Origin: United States
Language: English
Annotation: A local area network (LAN) of computers requires three types of protection: disaster recovery, physical security, and data security.
Abstract: To protect data against disaster, multiple servers should be placed at various locations, so that each server can absorb critical workloads. Another way to protect data is to copy critical files and store one or more copies at locations away from the server. Although physical security can play an important part in disaster recovery, it more broadly encompasses physically protecting the LAN and its resources from misuse. Controlling who has physical access to LAN resources is the key to physical security. Restricting who can upload programs and copy data is another physical security measure. Diskless workstations prevent users from loading unauthorized software from disk. Developing procedures to control what programs get used on the LAN is a key component of data security. Once the procedures are in place, access controls can be the means of enforcement. To cover flaws in security, there must be multiple layers of defenses supported by audits.
Main Term(s): Computer privacy and security
Index Term(s): Data security ; Security systems ; Security management
 
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/Publications/abstract.aspx?ID=121485

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.


Contact Us | Feedback | Site Map
Freedom of Information Act | Privacy Statement | Legal Policies and Disclaimers | USA.gov

U.S. Department of Justice | Office of Justice Programs | Office of National Drug Control Policy

place holder