A Common Weak-Link in the Security Chain
نویسنده
چکیده
The need for computer security is commonly accepted today in government and industry. Numerous studies have shown both an increase in security incidents as well as an increase in interest by organizations to address security issues. Many security tools such as firewalls and intrusion detection systems are becoming commonplace in organizations yet intruders still are able to penetrate computer networks. Often this is because security administrators neglect to address one of the most common weaklinks in the “security chain” – modems attached to individual machines inside of the security perimeter. The use of “war-dialers” have been discussed in numerous articles and have been made famous though movies such as War Games. Many security professionals, however, commonly neglect to use this or similar tools as a means to audit their organization’s modem use. This paper discusses this common weak-link in security and proposes methods to address this aspect of computer security
منابع مشابه
A Criticism of the Orientalists' Views on the Common Link Based on Shiite Hadiths
One of the topics of interest to the Orientalists in the field of history of hadith and jurisprudence is the common link theory which deals with serious and various problems in jurisprudential documents and narrations. Some of these problems are: the common link of narrators, family documents, involvement of too old narrators in documents, back-ward growth of documents and argument from silence...
متن کاملIran and Security Complex in the Persian Gulf
This article enters into the debate on the link between security and identity by looking at the security context in the states surrounding the Persian Gulf, particularly Iran. Earlier scholarly works have approached security and identity separately, but lack a framework that connects them in a single account. The process tracing method offers a scientific approach to connect various notions in ...
متن کاملA Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania
This paper discusses the human dimension in a ‘security chain’ within information systems and networks. This dimension is often overlooked at different stages and levels of ICT development and implementation. An example of this omission could happen at the stages of design and implementation of various ICT systems or strategies and policy formulation concerning ICT use; at the level of an organ...
متن کاملDwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملConsidering the Coefficient of Relationship between the Students’ Attitude toward Social Networks Policy making with Social Security Feeling
Abstract:This study aims at measuring the relationship between students‟ attitude toward govern-ment‟s virtual social network policy making with social security feeling, in another word, to which extent social security feeling emphasizing on social networks is determined via users‟ attitude toward government‟s media policy making? Analytical-descriptive method including survey is used in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999