{"title":"A Proactive Approach to Detecting and Reducing Information Security Threats in Billing Systems","authors":"Dustin Erhardt, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482636","DOIUrl":null,"url":null,"abstract":"A billing system consists of many components that allow an end user to be able to add, view, print, or perform normal billing operations. These components can be in the form of servers, desktops, laptops, routers, firewalls, printers, and other appliances. All of these components connect together in some form to make up the complete billing system. The security of the whole billing system is reliant on the security of each individual component and process. Using a well managed and thorough vulnerability management system, the security of each of these components can drastically be increased. By mitigating the vulnerabilities that exist on each individual component, the vulnerabilities and security holes in the system can be greatly reduced.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Conference on Future Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUTURETECH.2010.5482636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A billing system consists of many components that allow an end user to be able to add, view, print, or perform normal billing operations. These components can be in the form of servers, desktops, laptops, routers, firewalls, printers, and other appliances. All of these components connect together in some form to make up the complete billing system. The security of the whole billing system is reliant on the security of each individual component and process. Using a well managed and thorough vulnerability management system, the security of each of these components can drastically be increased. By mitigating the vulnerabilities that exist on each individual component, the vulnerabilities and security holes in the system can be greatly reduced.