How can I convince my network admin that data at rest is more vulnerable than data in transit?

Requires Free Membership to View

It's easy for developers and network administrators to downplay vulnerabilities, but that's not reality. Data in transit can be vulnerable. Network analyzers can certainly capture data over the air or the wire, but there's no guarantee that the captured data would be useful.

However, an attacker on your network really poses bigger problems. I strongly believe that data at rest is really "where the goods are" -- storage is where information is present for the longest period of time, and this time gives the attackers the edge to pick and choose, copy and delete, and basically wreak havoc. Consequently, securing data at rest can give you the biggest payoff.

Listen to the Storage Security FAQ audiocast here.

Go to the beginning of the Storage Security FAQ Guide.

This was first published in March 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: