CMMS/EAM ±¹³»ÀÚ·á | CMMS/EAM ÇØ¿ÜÀÚ·á | Terms (¿ë¾î¼³¸í) | Others |

 




Fail-safe systems

³ªÀνºÅæÁîÁÖ½Äȸ»ç (nineSTONES)

Fail-safe systems

Combining techniques to protect your hard-earned data

The security of your CMMS data is constantly at risk because of mechanical or electrical breakdown, human error, or malicious acts such as hacking or computer viruses. Although there is no such thing as a 100 percent fail-safe solution, you can minimize your losses through proper preparedness. This article discusses ten ways in which to protect against security breaches.

Backup protection
The most fundamental means of securing your data is to backing it up. There are many reusable media from which to choose. Diskettes are inexpensive but have limited capacity and low speed. They are recommended for small storage requirements or incremental back-ups.Tape is probably the most economical, but it is slower than other methods. Removable or external hard drives are very expensive if multiple versions are kept in backup. Zip drives are cheaper and have lower capacity. A variation of the removable hard drive, a jaz drive is an example of a higher capacity and faster version of the zip drive.

All but the first can store more than one gigabyte of information on each drive or cartridge. Compact disks and optical disks can store more information, but are more expensive and not generally reusable.

To avoid the pain that most of us have experienced when a hard disk crashes or data is suddenly lost, make sure that you devise an effective backup model that allows you to reconstruct the data from several months ago. As well, make sure that users are storing their data on the network not just their hard drive because it is far easier, cheaper, and more reliable to backup centrally. This is also true for users with laptops, or those dialing in remotely.

To avoid the pain that most of us have experienced when a hard disk crashes or data is suddenly lost, make sure that you devise an effective backup model that allows you to reconstruct the data from several months ago.

Redundancy
NASA, the military, and nuclear power plants are famous for spending big dollars on redundant systems. But in our fast-paced business environment where our dependency on computers is increasing steadily, reasonably-priced redundancy schemes are very much in demand. This is probably true for your CMMS. How long could you survive with your network down?

Three of the more popular means of ensuring redundancy are as follows:

Load sharing--The most obvious approach to redundancy is to have identical hardware and software running in parallel, each at fifty percent or less of capacity. If one unit goes down the other assumes the entire load. However, any data lost on the unit that is inoperable must be obtained from a back-up source.

Mirroring--Although there are many
variations on the theme, the key to mirroring is that data is duplicated simultaneously and identically on two separate units. A unit can be a hard drive, central processing unit, whole computer, and so on.

RAID--Redundant Arrays of Inexpensive Disks (RAID) technology spreads identical data across an array of disk drives for improved
performance and redundancy. The user, however, sees only one logical drive at any given time. If a single drive in the array fails, the logical drive continues to function without loss of data, and with only a slight loss in performance until the drive is replaced.

Authentication
To protect your CMMS and other software applications from unwanted access, the computer must first verify that you are who you say you are. Some examples of authentication techniques are briefly described below. Note that greater
security is achieved through a combination of methods.

Passwords are the simplest and not very reliable as a standalone solutions. They must be changed often to avoid copying and users often forget their passwords token--anything from a simple metal disk to a sophisticated smart card or transponder that identifies and authenticates a legitimate user

Digital signatures are a popular security method for Electronic Data Interchange. They validate sender and receiver and are legitimate through third-party certification biometrics. They use a unique personal characteristic such as fingerprint, voice, palm print, retinal or iris scan, or face scan to authenticate the user. The prices have dropped to allow for home or office LAN application

Virus protection
It is hard to believe that thousands of people worldwide have created computer viruses--software whose sole purpose is malicious in nature. A virus is a software program that reproduces itself and is distributed via diskettes, a network, or the Internet. It can infect the boot sector of a hard drive, attack the partition table, or attach itself to any .exe or .com file. Every virus has a trigger such as a specific date or the running of a certain program.

The best way to combat viruses is to scan software received from an external source such as a diskette given to you by a friend or a file downloaded from the
Internet. Virus detection and disinfection software is available for protecting your network, laptop, and remote computer.

To protect your CMMS and other software applications from unwanted access, the computer must first verify that you are who you say you are.

Audit trail
In general, there are three levels of sophistication for audit trails, either built into the CMMS, running as third-party software, or included with the operating system. The most basic is a summary of who has logged in and out of the CMMS and network. The next level logs all changes to the database, and the most sophisticated audit trail keeps a record of every keystroke for every user. The latter log occupies considerable disk space for a large number of users, or transaction-intensive environments.

Error checking
In order to prevent security breaches due to human error, the CMMS and other applications should be written with error-checking capability. A simple example, would be to block a user from entering erroneous data or performing a potentially inappropriate action such as deleting data.

Firewall
Any network or standalone PC that provides access to the external world requires protection from unwanted entry. A firewall is a device that filters and checks all data flowing to or from another computer, network, or the Internet. This is an expensive but necessary addition to your CMMS in order to allow safe access remotely or via the Internet.

A virus is a software program that reproduces itself and is distributed via diskettes, a network, or the internet. It can infect the boot sector of a hard drive, attack the partition table, or attach itself to any .exe or .com file.

Encryption
One of the most secure methods of protecting your data is encryption. This involves encoding data using an algorithm that can vary in sophistication depending on the level of security required. A key to the algorithm is then required to decode the data. Encryption is especially critical to ensure data integrity and confidentiality on the internet, if widescale electronic commerce is to become a reality.

Physical security
One of the simplest and most effective means of securing your hardware and software is to keep it locked. Network equipment should be locked in a room with carefully controlled access. Laptops should be anchored and locked to a desk when in use, and stored in a locked cabinet at the end of the day. Offices should be kept locked at all times, and access controlled using security guards or an authentication system.

Business recovery planning
When preventive measures above fail, there must be a plan in place to recover from the loss. Business Recovery Planning is discussed in detail in the March, 1998 column.


Copyright May 1998 Plant Services on the WEB


 

Tel : 010-3303-9909