Cost-Effective Protection of Information Systems
نویسندگان
چکیده
Commercial and government organizations are deploying database management system (DBMS) technology as the backbone for their electronic commerce and Internet-based computing applications. As one would expect, these organizations require high performance, scaleable, fault-tolerant systems that can efficiently and securely process transactions from thousands of concurrent, distributed clients. As application requirements for performance increase, multi-vendor, multi-component architectures to support these requirements are becoming more complex. However, commercial off-the-shelf technologies are being utilized for a variety of new web-based applications that support these application requirements in terms of both performance and security. Historically, client/server applications were developed and the security of these “two-tier” applications was fairly straightforward. The client application was written and tested to verify correctness. The client application communicated directly with the backend commercial DBMS, which had already been evaluated as meeting various internationally recognized security metrics (e.g., Orange Book, ITSEC). Additionally, the networks were “closed” to protect the information from flowing outside the defined community of interest. Therefore, even if there was a security flaw in the application code, the damage was restricted to those already possessing sufficient “need to know.” Today’s “service centric” application architectures are more complex. They include multiple tiers on multiple platforms performing specific tasks. For example, a browser client might authenticate to a web page that accesses information stored in a database behind a firewall, with the database obtaining authorizations for the user based upon information stored in a directory. Therefore, the application architecture must rely upon, for example, 1) a Secure Sockets Layer (SSL) connection to the web application server, 2) a secure connection through a firewall to the database, 3) a secure lookup of user information in a (LDAP) directory, and 4) mutual authentication of each of these interfaces using smartcards, Kerberos, X.509 certificates, or passwords. While the integration of these components may add complexity to the application (versus client/server), organizations require this type of configuration to enhance security. This architecture, while more complex than client/server, is more performant, supports a variety of user authentication mechanisms, and adds layers of protection as the application process flows between tiers. In essence, each layer has the capability to re-verify the transaction as it passes through its realm. This gives rise to applications that are costeffective and secure. It is for this and other reasons that organizations in defense, healthcare, social services, and electronic commerce are deploying applications with multi-tier architectures. In addition to process isolation and separation for performance and throughput, these additional layers add to the security of the overall system. The presentation will describe customer implementations of this architecture and the benefits and challenges involved in their deployment.
منابع مشابه
Resilience Enhancement of Active Distribution Networks Via Mobile Energy Storage Systems and Protection Coordination Consideration
Owing to the portability and flexibility of mobile energy storage systems (MESSs), they seem to be a promising solution to improve the resilience of the distribution system (DS). So, this paper presents a rolling optimization mechanism for dispatching MESSs and other resources in microgrids in case of a natural disaster occurrence. The proposed mechanism aims to minimize the total system cost b...
متن کاملA New Method for Improving Computational Cost of Open Information Extraction Systems Using Log-Linear Model
Information extraction (IE) is a process of automatically providing a structured representation from an unstructured or semi-structured text. It is a long-standing challenge in natural language processing (NLP) which has been intensified by the increased volume of information and heterogeneity, and non-structured form of it. One of the core information extraction tasks is relation extraction wh...
متن کاملCost-effectiveness Analysis of Hospital Information System in Comparison with Manual System in Selected Sections of Namazi Hospital of Shiraz
Background & objectives: Health information technology provides a powerful tool for monitoring the health system's performance. This study aimed to assess the cost-effectiveness of hospital information system in comparison with manual system in selected sections of Namazi hospital in Shiraz. Methods: This descriptive-analytical research was a economic evaluation carried out at Namazi hospital ...
متن کاملIntegrating activity-based costing and environmental cost accounting systems: a case study
The integration of activity-based costing (ABC) and environmental cost accounting (ECA) systems provides companies with more accurate information to make both well-rounded and effective decisions. The purpose of this study is to propose an effective approach to integrate both ABC and ECA systems. A case study analysing process is used to compare the traditional accounting system and the ABC sys...
متن کاملConstraints to Effective Use of Information Communication Technologies (ICTs) among Small-scale Farmers in Anambra State, Nigeria
The study was carried out in Anambra State, Nigeria. Questionnaire was used to collect data from a sample of one hundred and eight (108) small-scale farmers. Percentage, mean score, standard deviation and factor analysis were used for data analysis. The duration of the study was June 2009 and March, 2010. Results of the study indicated that the major constraints to effective use of ICTs by smal...
متن کاملHigh-Speed and Cost-Effective Data Protection for Oracle Engineered Systems
• Real-time analysis and diagnosis of performance • Pre-configured solution streamlines deployment • Single vendor support Key Advantages of the Oracle ZFS Storage ZS3-BA • Application engineered storage specifically designed for Oracle engineered systems and other Oracle platforms, including unique integration with Oracle Database • High performance dramatically reduces backup windows and rest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999