The 5th Factor: Behavior Profiling Opens New Possibilities for Web Access Control

نویسنده

  • Bob Forbes
چکیده

INTRODUCTION The Internet continues to revolutionize E-business, not solely through direct consumer sales, but by enabling companies to share enormous amounts of information with a wider, distributed user base. New information partnerships enable creative synergies at all levels of business, signifying an exciting time of growth and change. And in this new business environment, to the nimble go the spoils. However, increased openness means increased risk. Threats to corporate data security loom perilous. The total annual cost of online security violations tops $15 billion, with nearly 60 percent of attacks coming from internal sources. Recent surveys of U.S. corporations show that 85 percent reported security breaches in the last six months, with two thirds of those leading to direct financial losses. To be successful, a company must protect its valuable information assets and ensure that P A Y O F F I D E A

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Assessing the Internal Structure of the Ellis Information Retrieval Model in Order to Present the Persian Norm of Web Retrieval Tools

Introduction: Study evaluated the internal structure of Ellis information seeking model in the student community with the aim of presenting the Persian norm. Methods: This is a descriptive-analytical study conducted by cross-sectional survey method in the second semester of the academic year 1399-1400. Population comprise of 280 graduate students at Ahvaz Jundishapur University of Medical Scien...

متن کامل

Collaborative bibliography

A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes ascribed to a work and the needs of readers, bibliographic work is largely conceptual even across technological eras and domains. Yet, the development of networked information services, made possible by WWW infrastructur...

متن کامل

Collaborative Bibliography Collaborative Bibliography

A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes ascribed to a work and the needs of readers, bibliographic work is largely conceptual even across technological eras and domains. Yet, the development of networked information services, made possible by WWW infrastructur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2002