2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet661/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   657   658   659   660   661   662   663   664   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Software Licensing 
Organizations pay for software, and license keys are routinely used to activate the soft-
ware. The activation process often requires contacting a licensing server over the internet to 
prevent piracy. If the license keys are leaked outside the organization, it can invalidate the 
use of the key within the organization. It’s also important to monitor license compliance to 
avoid legal issues. 
For example, an organization could purchase a license key for fi ve installations of the soft-
ware product but only install and activate one instance immediately. If the key is stolen and 
installed on four systems outside the organization, those activations will succeed. When the 
organization tries to install the application on internal systems, the activation will fail. Any 
type of license key is therefore highly valuable to an organization and should be protected. 
Software licensing also refers to ensuring that systems do not have unauthorized 
software installed. Many tools are available that can inspect systems remotely to detect 
the system’s details. For example, Microsoft’s System Center Confi guration Manager 
(Confi gMgr or SCCM) is a server product that can query each system on a network. 
Confi gMgr has a wide range of capabilities, including the ability to identify the installed 
operating system and installed applications. This allows it to identify unauthorized soft-
ware running on systems, and helps an organization ensure that it is in compliance with 
software licensing rules. 
Tools such as ConfigMgr regularly expand their capabilities. For example, 
ConfigMgr now can connect to mobile devices, including those running 
Apple’s iOS and Android-based operating systems. In addition to identify-
ing operating systems and applications, it can ensure that the clients are 
healthy according to predefined requirements, such as running antivirus 
software or having specific security settings configured.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   657   658   659   660   661   662   663   664   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish