Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?
نویسندگان
چکیده
One of the challenges facing computer systems is resisting attack and compromise in a networked environment. Today’s computing environment is fairly homogeneous, due to a relatively small number of operating systems and application functions running on the vast majority of computers. This environment allows attackers to focus their efforts on the few types of systems deployed. Once an exploit is found, the exploit is effective against a very large number of systems running the same software. The large number of attack methods available on hacker Web sites demonstrates the ease with which attackers can exploit this homogeneous environment. This paper examines several widespread computer attacks to understand the effect of diversity on maintaining the integrity, and hence survivability, of information systems.
منابع مشابه
City Vulnerability Assessment with Passive Defense Approach; A Case Study: Rasht City, Iran
BACKGROUND: The passive defense approach is one of the approaches in planning and organizing cities and residential complexes with the aim to reduce environmental hazards. Given the vital and sensitive position of cities, while preparing against military invasions, this approach provides special capabilities to cope with natural and human crises to a large extent. METHODS: This was an applied s...
متن کاملStrategy, Management Accounting Systems, and Performance of Iranian Petrochemical Companies in the Light of Contingency Theory
In the present business atmosphere, an organization should be able to respond to environmental needs occasioned by rapid and dynamic evolution as quickly as possible. It is obvious that such ability is impossible without a proper strategic approach, strategic thinking, and a suitable management accounting system. This study attempts to investigate the relationships between strategy, management ...
متن کاملAdvertising Keyword Suggestion Using Relevance-Based Language Models from Wikipedia Rich Articles
When emerging technologies such as Search Engine Marketing (SEM) face tasks that require human level intelligence, it is inevitable to use the knowledge repositories to endow the machine with the breadth of knowledge available to humans. Keyword suggestion for search engine advertising is an important problem for sponsored search and SEM that requires a goldmine repository of knowledge. A recen...
متن کاملBehavioral Considerations in Developing Web Information Systems: User-centered Design Agenda
The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users. From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...
متن کاملA Security Effective Structure for National Defense in the 21st Century
In accordance with human necessities and deep attention into security, research studies have today became an irrefutable necessity in this area. It is noted that traditional concepts of this important issue have changed, as a result of occurring various events in the past, particularly in the 20th century; so that security is no more limited to protecting human beings against individual and col...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001