Discover
/
Article

How safe are your data?

MAY 04, 2010
Physics Today
Nature News : In 2002, bioinformatician Mark Gerstein and his colleagues set up a server to host some commonly used genomics databases to monitor any anomalies in web traffic or surreptitious scans.Seven months later, the picture that emerged was one of a network under siege. Not all of these visits were attacks, Gerstein notes, but many were.Protecting research data presents particular challenges. Most information-technology (IT) professionals suggest ensuring that large or sensitive data stores are managed by a centralized IT team that can monitor and administer systems, keeping a close watch over traffic and limiting access.But this can conflict with the ethos of researchers who need such systems to be accessed by a wide variety of students, postdocs, and collaborators.
Related content
/
Article
The finding that the Saturnian moon may host layers of icy slush instead of a global ocean could change how planetary scientists think about other icy moons as well.
/
Article
/
Article
After a foray into international health and social welfare, she returned to the physical sciences. She is currently at the Moore Foundation.
/
Article
Modeling the shapes of tree branches, neurons, and blood vessels is a thorny problem, but researchers have just discovered that much of the math has already been done.

Get PT in your inbox

pt_newsletter_card_blue.png
PT The Week in Physics

A collection of PT's content from the previous week delivered every Monday.

pt_newsletter_card_darkblue.png
PT New Issue Alert

Be notified about the new issue with links to highlights and the full TOC.

pt_newsletter_card_pink.png
PT Webinars & White Papers

The latest webinars, white papers and other informational resources.

By signing up you agree to allow AIP to send you email newsletters. You further agree to our privacy policy and terms of service.