Monitoring Mission Critical Data for Integrity and Availability

نویسندگان

  • Michael Gertz
  • George Csaba
چکیده

Protecting the integrity, confidentiality, and availability of mission critical data is one of the primary objectives shared among security/risk management and IT departments in various vertical industries, government, and research. Standard techniques to realize these objectives are often confined to network and host-based intrusion detection systems, which are known to be inappropriate for handling security threats caused by insiders. This paper introduces the concept of data content, metadata and privilege monitoring systems as an additional line of defense against external and internal security threats. These systems, which are closely coupled with a database managing mission critical data, provide security/risk management and IT personnel with effective means for specifying, detecting, and responding to anomalous behavior of data and data accesses caused by users and applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Key Cryptography by Centralized offline Server in Mission-Critical Networks

–Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unreli...

متن کامل

Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks

Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unrelia...

متن کامل

HP Integrity Superdome 2: The ultimate mission-critical platform- Technical white paper

Introduction .................................................................................................................................................................................... 2 Product family ................................................................................................................................................................................ 2 Perform...

متن کامل

Middleware Support for Adaptive Dependability through Explicit Runtime Integrity Constraints

Integrity and availability are two competing dependability attributes. While some applications require strict integrity, other applications exist, e.g., safety or mission critical systems, where—depending on the specific situation— availability is more important for dependability than strict integrity. Within our work, we focus on data-centric systems, where availability can be increased by tem...

متن کامل

Recent Advances and Challenges in Wireless Multimedia Sensor Networks

Wireless Sensor Networks (WSNs) Akyildiz et al. (2002), Zhao & Guibas (2009) are formed of spatially distributed autonomous sensor nodes (motes). They are deployed in an environment where they can be used to monitor environmental conditions in collaboration, and communicate with each other through the wireless links. Several applications that are used in different areas have been outlined in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002