scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 927
Configuration Management and Firewalls Many people are uncertain of the meaning of the term Configuration Management This paper will clarify the term configuration as applied to computer used in support of core business and answer the question of how it can but used along with a firewall to provide total system security The proliferation of new computer-based products with attractive marketing makes the choice of business-support hardware and software difficult Attempts to integrate packages without due regard to the existing system can lead to difficulties There is a widespread recognition of the need for effective management of any computer system that supports a business function but even amongst the technocrats of the computer world there is uncertainty and suspicion about the term configuration management CM The term configuration is used to refer to all parts of a computer system hardware software application packages bespoke software operating systems software in-house developed and maintained software on-screen help files and documentation manuals working practices communication interfaces LANs WANs and all peripherals Many computer systems supporting a commercial concern will be undergoing change continually in order to keep that business current viable and competitive There will be a continual call for existing hardware to be upgraded new hardware to be purchased obsolete hardware to be replaced modern communications equipment to be installed networks to be developed new software packages to be added existing software to be upgraded etc Configuration management provides assurance that additions deletions or changes made to the TCB do not compromise the trust of the originally evaluated system Implementing a security program in a corporation involves making choices about using security measures such as firewalls and configuration management There are always tradeoffs and it is possible to bite off more than you can chew Any security measure is only as good as it is used properly A good example is intrusion detection products that are deployed but not used much in the sense that
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA