Lenovo ThinkCentre M51 IDC white paper titled "The Coming of Age of Clien
Lenovo ThinkCentre M51 Manual
View all Lenovo ThinkCentre M51 manuals
Add to My Manuals
Save this manual to your list of manuals |
Lenovo ThinkCentre M51 manual content summary:
- Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 1
IBM Corporation Roger L. Kay January 2003 SUMMARY Although security technology has progressed tremendously over time, awareness of the need for security on the part of people who use computers those that didn't. Data recovery is, of course, purportedly, an unknown quantity of Windows source code - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 2
desktop and notebook PCs still often have only a Windows password protecting them, and, in older Windows important element - the user's private key. To address this weakness, IBM has embedded the computing industry, and IBM has committed to making it available via license to anyone who wants one. IBM - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 3
computer on, and an intruder simply sits down at the absent worker's desk to feast on whatever privileges that user enjoys, including access to files, programs, and services ! Client security implementations ! The advantages of IBM's hardware security implementation ! The evolution of industry - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 4
a hot topic, particularly as devices are becoming smaller and more on the more immediate task of authenticating users at the point of entry and encrypting and clients, help protect computing assets from destruction, password schemes - still used in Windows 95 and 98 installations - can simply be bypassed - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 5
upgrade systems that lack the updates. Once inside the user of that client: access to files, programs, system resources, and, potentially, other users computer after computer into a captive resource. From this position, he can destroy or alter files, corrupt programs, erase nonvolatile storage devices - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 6
BY TYPE, 2000 as he downloaded millions of pages of sensitive data from defense department computers, including one and one that allows anonymous contact at the user's discretion. The packets flow to everywhere from routing, and packet spoofing makes it possible for someone to conceal his whereabouts, - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 7
link in the security chain, but it is by no means the only possible point of penetration. Breaches can be internal or external. Often, depredations come them as readable data. This same type of authentication can be pressed into service to authorize the client node's user to the network and all the - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 8
part of the decipherer but would still yield to trial and error. These types came in 1970, when IBM scientists developed the Data Encryption secret secretly. And so the possibility exists that clever Internet sniffers all depended on the absence of computing power, which in today's world can - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 9
128 bits. With these specifications, AES would be far a few finalists. IBM championed an algorithm called . However, the problem of the shared two illustrations of how this type of encryption can be tucked away in his or her computer, and for every voter a Rijndael was chosen partly because it was - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 10
public key, but only the holder of the associated private key can decrypt it. The weakness of asymmetric cryptography is that it is computationally intensive and would slow down data traffic unacceptably if it were applied promiscuously. So, as previously mentioned, in practical circumstances it is - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 11
trust the Net and all the clients and services that they run into, there would be of the grander visions of secure computing have been scaled back, at possible and even easy to set up basic security at the client node. User authentication at the client end can be performed adequately with smart cards - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 12
support PKI. An improvement over passwords, biometry provides better security because users problem of leaving highly entropic private keys around in main memory. Bottom line: Private keys, symmetric keys, credit card in the information technology industry. The IBM security chip is extremely secure, - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 13
five parts, allowing the restoration responsibility to be secured among multiple administrators. This archive data, including the administrative private key, can be stored on external removable media or on a network server. If the system, chip, or motherboard dies, or the system needs to be upgraded - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 14
secure protection against lunchtime attacks. In the Targus biometric recognition implementation, a spring-loaded PC Card-based device with a small reader on it pops out with a finger push. The device reads the user's fingerprint, which is used initially to set up access, and if it finds a match - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 15
universal in the computing industry, and IBM is committed to IBM's interest that this solution become as widespread as possible. The platform specification specification, version 1.2, is currently being refined. It is envisioned as part reasons, keys other than the user's private pair have relatively - Lenovo ThinkCentre M51 | IDC white paper titled "The Coming of Age of Clien - Page 16
secure support for of a specific gauge for BIOS has been changed since the previous boot. ! The embedded chip can perform the same authentication functions as an RSA secure ID keyfob, a device user. ! The chip can be used along with the IBM Client Password Manager software to replace most of the user
WHITE PAPER
The Coming of Age of Client Security: Top Managers Realize They
Have to Lock Down the Point of Entry
Sponsored by: IBM Corporation
Roger L. Kay
January 2003
SUMMARY
Although security technology has progressed tremendously over time, awareness of
the need for security on the part of people who use computers ° both consumers
and businesspeople ° has not in general kept pace. Essentially, there is plenty of
technology on hand, but the understanding of what it does and how to use it has
lagged. However, much has changed since the attacks of September 11. CEOs and
IT managers everywhere drew lessons from the differing fates of companies that had
backup and restore procedures and those that didn’t. Data recovery is, of course, only
one piece of the security pie, but as political tensions have increased on the macro
level, this and other security concerns have risen in visibility with top managers. "To
what degree is our data ° and therefore our business ° safe?" CEOs are now
asking in ever greater numbers and with increasing vehemence. "Just where are we
with security?" they want to know of their CIOs.
This shift in attitude represents an evolution from the pre±September 11 state, which
was characterized by a vague awareness of some subset of security issues but a
misunderstanding of the complete security picture and a widespread lack of adoption
and deployment.
Now managers are beginning to assess their vulnerability and to ask what their
alternatives are.
In most corporations, the security infrastructure is still inadequate and full of holes.
Even the most sophisticated organizations are vulnerable. In one incident, widely
reported in the press, that had an impact of major but unknown proportions ° the
degree of penetration was difficult to assess ° a hacker from St. Petersburg, the
intellectual seat of the old Soviet Union, broke into Microsoft’s network and
absconded with a large number of important files, including, purportedly, an unknown
quantity of Windows source code files. Naturally, Microsoft never advertised the
extent of the damage ° if, indeed, it is actually known. And if a company at the
epicenter of the information technology business is vulnerable (and by inference
should know better), truly, no company is safe from attack.
The security threat is growing in several dimensions at once. The amount of value
flowing across the network ° in the form of actual money, but also business plans,
intellectual property, and strategic documents ° is rising by leaps and bounds. And
value is at risk in less obvious ways. A reputation can be damaged irreparably by an
attack, business can be lost as a result of downtime, and the trust on which ebusiness
is based can be destroyed permanently. To the growing list of imaginative crimes
must be added identity theft, which has become a veritable cottage industry. In
addition, malicious hackers are getting more sophisticated. Malevolent programmers
are not only figuring out more effective ways to harm businesses and individuals but
are also publishing their tricks on Web sites for other less creative, but perhaps more
vindictive, people to find and use.
Global Headquarters: 5 Speen Street
Framingham, MA 01701 USA
P.508.872.8200
F.508.935.4015
www.idc.com
²To what degree
is our data
and therefore our
business
safe?"
CEOs are now
asking.
The security threat
is growing in several
dimensions at once.