فایل ورد کامل امنیت کامپیوتر در محیط محاسبات توزیعی
توجه : به همراه فایل word این محصول فایل پاورپوینت (PowerPoint) و اسلاید های آن به صورت هدیه ارائه خواهد شد
این مقاله، ترجمه شده یک مقاله مرجع و معتبر انگلیسی می باشد که به صورت بسیار عالی توسط متخصصین این رشته ترجمه شده است و به صورت فایل ورد (microsoft word) ارائه می گردد
متن داخلی مقاله بسیار عالی، پر محتوا و قابل درک می باشد و شما از استفاده ی آن بسیار لذت خواهید برد. ما عالی بودن این مقاله را تضمین می کنیم
فایل ورد این مقاله بسیار خوب تایپ شده و قابل کپی و ویرایش می باشد و تنظیمات آن نیز به صورت عالی انجام شده است؛ به همراه فایل ورد این مقاله یک فایل پاور پوینت نیز به شما ارئه خواهد شد که دارای یک قالب بسیار زیبا و تنظیمات نمایشی متعدد می باشد
توجه : در صورت مشاهده بهم ریختگی احتمالی در متون زیر ،دلیل ان کپی کردن این مطالب از داخل فایل می باشد و در فایل اصلی فایل ورد کامل امنیت کامپیوتر در محیط محاسبات توزیعی،به هیچ وجه بهم ریختگی وجود ندارد
تعداد صفحات این فایل: ۸ صفحه
بخشی از ترجمه :
راه حل های ارایه شده در این جا خود نقطه شروع برای سازمان های توزیعی جهت تبدیل شدن به یک سازمان واحد و منسجم می باشد. تغییرات فوری نمی باشند یعنی تغییرات یک شبه انجان نمی شوند بلکه همکاری، زمان و صبر برای ایجاد نقطه عطف و دگرگونی سازمان لازم است تا بتوان مشکلات رایانه ای را بدون در نظر گرفتن ساختار و هویت واحد حل کرد. این راه حلها می توانند ارتباطات و بازیابی ها را بهبود ببخشند.
عنوان انگلیسی:Computer Security in a Distributed Computing Environment~~en~~
Working in a Distributed Environment Managing security in a distributed environment is a monumental task. One model of a distributed computing environment is made up primarily of three significant entities: individual departments, a central computing department, and users. These three entities must work together to establish a healthy, working computing environment. In essence, it is a federated, or federal, model of computing. “Federal: of or constituting a form of government in which power is distributed between a central authority and a number of constituent territorial units” (Leatherbury, slide 2) Each individual department hires its own network administrator, who is given the daunting task of providing sole system management for a significant number of unique devices, operating systems, and applications for a large and varied user base. (In some cases, a single network administrator may oversee computing operations in several departments.) He or she must maintain and control the operations of these systems, and attain an appropriate level of knowledge necessary to secure them. The network administrator is supervised by a manager who may or may not be a computing professional, thus may not fully understand the responsibilities inherent in managing a network. The central computing department houses a large number of system administrators who provide specialized, second level support for the network administrators of the individual departments. Areas of expertise include communications, mainframe, applications, programming, desktop operating systems, web support, helpdesk management, and security. The level of support given to the network administrator is determined by the amount of specialized support needed for each system. Support can range from minimal, to in-depth or hands-on. The central computing department is managed by high-level computing professionals, and also has its own network administrator who has the daunting task of providing support for each of these individual “users”. The communications team manages the organization’s network infrastructure. Network managers in individual departments (those not found in central computing) manage their own “subnet” of the main network. © SANS Institute 2000 – 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2000 – 2002 As part of GIAC practical repository. Author retains full rights. The user base in a distributed environment varies. The definition of a user, according to an online, web-based dictionary is: “An individual who uses a computer. This includes expert programmers as well as novices. An end user is any individual who runs an application program.” (Webopedia, URL: http://www.pcwebopaedia.com/TERM/u/user.html ) A “user” in a distributed computing environment may include network administrators, system administrators who provide support in specialized areas, top level management, regular staff, management, or the novice. Security Problems in the Distributed Environment In a distributed environment with thousands of “users”, it becomes very difficult to maintain adequate security-related controls. “Users” find creative ways to intentionally bypass security policies and other procedures that were created to protect resources. Some “users” cause problems out of ignorance (unaware of security policies). Others open the door to hackers by refusing to upgrade/update systems. In some cases, “users” don’t protect the physical security of computing resources. In any case, lack of communication is most likely the catalyst for these problems which can cause confidentiality, availability, and integrity breaches. In the distributed environment, lack of communication between departments and “users” is a problem. Network or system administrators who are responsible for their own “subnet” are generally unaware of projects and progress that other network or system administrators have achieved in other departments. They are also unaware of the problems that are encountered in other departments. Because of this lack of communication, or lack of information sharing between departments, similar problems experienced in different areas proliferate through the entire organization. These problems could be resolved if network administrators were more willing to share their experiences, problems, and achievements. The information could be invaluable to an area struggling with a similar project or problem.
$$en!!
- همچنین لینک دانلود به ایمیل شما ارسال خواهد شد به همین دلیل ایمیل خود را به دقت وارد نمایید.
- ممکن است ایمیل ارسالی به پوشه اسپم یا Bulk ایمیل شما ارسال شده باشد.
- در صورتی که به هر دلیلی موفق به دانلود فایل مورد نظر نشدید با ما تماس بگیرید.
مهسا فایل |
سایت دانلود فایل 