• Grid View
  • List View
  • Research Bytes - Combating Back Door Vulnerabilities in Data Center Procedures

    Combating Back Door Vulnerabilities in Data Center Procedures

    Although IT professionals usually adhere to strict security guidelines when dealing with user systems, they sometimes drop their guard when the implement systems and procedures in the data center itself. This article highlights the security weaknesses that can be created by such administrative procedures and outlines common sense management practices that can close such back door vulnerabilities.

    March, 2006