Please Note:
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Discuss the types of controls a company could implement to help secure a company’s network.
There are several types of controls to protect data on the network. My personal favorite is the RAID setup. RAID comes in different variations such as RAID5, RAID1, RAID0, RAID10, and RAID6. The point of the RAID setup is to store copies of data across multiple disks either by pairs or stripes or both in the cases of RAID5 and 6. In the event of a disk becoming corrupt or crashes, the data that has been copied to another disk can be used to rebuild the crashed disk. This is a good method of data loss prevention. Another method is the iSCSI protocol. it has the benefit of appearing to be a local network but actually provides remote access.
-Jacob
You have put great information, and I like that you used RAID as your topic, and I am glad to see that this is the one you used here.
Hello Jacob,
I agree that RAID storage is one of the best ways to protect data because of fault tolerance. RAID 5 is usually a great option because it uses parity but I also like RAID 10 because it combines the mirroring of RAID 1 with the striping of RAID 0.
In this day and age, there are a plethora of options for storing data. Some of the most popular are cloud storage, external hard drives and network attached storage. Each type of storage offers, different benefits. I believe the most popular in current time is cloud Storage. Cloud storage allows you to store your data on remote servers with a third-party company, This can in-turn give a company the freedom to not worry about hardware and the issues that come with maintaining it. There are different types of cloud storage one type is personal cloud storage. This is the type of storage we see on personal accounts for example Google drive, iCloud,and drop box another type of cloud storage is enterprise. This particular form of cloud storage is used on a grand scale, typically for larger companies. It has availability allowing the company to scale its data, it also offers a multitude of disaster recovery options. Seeing how this type of cloud is used for companies, it is customizable. Hybrid cloud storage is an option consisting of a combination of virtual storage as well as physical. This can be useful for companies who are able to keep some data servers in-house while also using a virtual cloud to maintain data that may not be considered as sensitive.
Latoya,
I liked that you mentioned external hard drives. I think that most people have this as their first method of storage without realizing it. I remember when I first started college, I used an external hard drive to store all of my papers and projects. I also used a 4-terabyte hard drive to extend the storage capacity of my PS4. This method is an easy way to add storage that doesn’t take up much physical space.
-Jacob.
Hello Jacob,
I think it’s really amazing that you have the knowledge to be able to add more storage to your own personal devices like a PS five. I have seen people perform different things like that online but wasn’t personally aware of how complex or simplistic it was have you ever tried doing that on any other devices like your computer or have you ever built a computer from ground up?
Some controls that a company can use to help serve a company’s network would be the firewalls because this is what helps the network traffic, and this can also help the traffic coming into the network. Another could be the password policies that a company has such as it can help keep them strong and up to date meaning to change them so often, so it is not at risk to be hacked. All of this and more helps to keep and secure your company’s network and are very important.
One type of control a company could implement to help secure its network is TPM. TPM is a trusted platform module used to encrypt servers’ hard drives and memory. By using TPM companies will secure their networks by encrypting their data in a way that’s only readable to the person or people with the correct key to the encryption. This means that if someone happens to steal the physical drive from the company they won’t be able to use the information unless they manage to find the right key. TPM also proves the integrity of the system or computer by checking the IP or MAC address to ensure that the computer is supposed to have those encryption data collections. According to Intel, “A TPM, or a trusted platform module, is a physical or embedded security technology (microcontroller) that resides on a computer’s motherboard or in its processor. TPMs use cryptography to help securely store essential and critical information on PCs to enable platform authentication.”
(n.d.). What Is a Trusted Platform Module? Intel. Retrieved November 24, 2024, from https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/trusted-platform-module.html#:~:text=A%20TPM%2C%20or%20a%20trusted,PCs%20to%20enable%20platform%20authentication.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .