Page History
Table of Contents |
---|
Risks
The critical point when it comes to job scheduling is the fact that it perfectly implements code injection across your network - which is what we usually call a vulnerability.
...
- Frequently a few persons with access to the job scheduling product manage job executions for a larger number of servers in the network. You have to trust their honesty.
- At the same time an increasing number of attacks on data security is performed inside the IT operations department.
Mitigation Strategies
Basically risks boil down to network security and personal responsibility.
...
Overview
Content Tools