Adaptive Support for IT Security Tasks
نویسنده
چکیده
Living in a networked world has not only positive effects like "unrestricted" access to many kind of services 24 hours a day, seven days a week. It also holds many risks like viruses, intrusive attacks, violation of privacy, and the whole set of well know risks combined with the use of software. Organizations providing eCommerce and especially, eGovernment services are in the focus of internet-criminals. Getting illegal access on or even control of a server of such an organization leads to significant loss of trustworthiness from a customer point of view. The criminal themselves will have both, doubtful glory in their community and "financial success" if they achieve to get credit-card numbers or similar. The author addresses this very urgent IT-security topic presenting a generic approach that can also be adopted to eCommerce solutions.
منابع مشابه
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells wh...
متن کاملEffectiveness of IT Security Tools in Practice
In today’s world, IT security plays a critical role in different organizations, yet little is known about IT security in the context of organizations. This paper addresses this issue based on qualitative description analysis of 10 interviews with IT security practitioners from small to medium size organizations. Our results revealed the required knowledge and skills for effective IT security, I...
متن کاملNetwork Risk Evaluation by Data Mining
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
متن کاملAdaptive defense measures against the security hazards induced by systems virtualisation
The explosive proliferation of systems virtualisation supports a more adaptive delivery of IT services. In the area of security management, however, virtualisation carries beneficial as well as detrimental implications. Fig. 1 shows the sources of requirements on security management: they originate either from technical sources, in a bottom-up view, or from high-level goals. As the business man...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملCoordination Challenges and Issues in Stability, Security, Transition and Reconstruction and Cooperative Unmanned Aerial Vehicle Scenarios
Through the emergence of new doctrine, stability operations are becoming a core U.S. military mission that the Department of Defense (DoD) must be prepared to conduct and support. These operations are now given priority comparable to combat operations. The immediate goal often is to provide the local populace with security, restore essential services, and meet humanitarian needs. The long-term ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002