Abstract
This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company’s server by a dishonest employee.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
DRBD – Software Development for High Availability Clusters, http://www.drbd.org
Stera, P.: Klaster niezawodnościowy dla serwera plików w systemie Linux – przykłady rozwiązań. In: Sieci komputerowe, Wydawnictwa Komunikacji i Łączności (to appear)
Sendmail, http://www.sendmail.org
Resnick, P. (ed.): Internet Message Format. RFC 2822 (April 2001), http://www.faqs.org/rfcs/rfc2822.html
Synonym, http://dv8.ro/Synonym/synonym.html
Copying all messages with Sendmail, http://www.brandonhutchinson.com/Copying_all_messages_with_Sendmail.html
Saout, C.: dm-crypt – a device-mapper crypto target, http://www.saout.de/misc/dm-crypt
Linux Unified Key Setup, http://code.google.com/p/cryptsetup
Truecrypt – free open-source on-the-fly encryption, http://www.truecrypt.org
Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation – Challenges and Solutions. Springer, Boston (2005)
Data Loss Prevention Best Practices. Managing Sensitive Data in the Enterprise. A Messaging Media Publication (2007)
Squid: Optimising Web Delivery, http://www.squid-cache.org
SquidGuard, http://www.squidguard.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stera, P. (2010). Company’s Data Security – Case Study. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2010. Communications in Computer and Information Science, vol 79. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13861-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-13861-4_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13860-7
Online ISBN: 978-3-642-13861-4
eBook Packages: Computer ScienceComputer Science (R0)