Risk Assessment in IT Infrastructure

B. K. Tripathy
{"title":"Risk Assessment in IT Infrastructure","authors":"B. K. Tripathy","doi":"10.5772/intechopen.90907","DOIUrl":null,"url":null,"abstract":"Due to large-scale digitization of data and information in various application domains, the evolution of ubiquitous computing platforms and the growth and usage of the Internet, industries are moving towards a new era of technology. With this revolution, the IT infrastructure of industries is rapidly undergoing a continuous change. However, the insecure communication channel; intelligent adversaries in and out of the scene; and loopholes in the software and system development add complexity in deployment of the IT infrastructure in place. In addition, the heterogeneous service level requirements from the customers, service providers, users, along with implementation policies in industries add complexity to this problem. Hence, it is necessary to assess the risk associated with the deployment of the IT infrastructure in industries to ensure the security of the assets involved. In this chapter, we present an efficient risk assessment mechanism in IT infrastructure deployment in industries, which ensures a strong security perimeter over the underlying organizational resources.","PeriodicalId":143303,"journal":{"name":"Security and Privacy From a Legal, Ethical, and Technical Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy From a Legal, Ethical, and Technical Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5772/intechopen.90907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Due to large-scale digitization of data and information in various application domains, the evolution of ubiquitous computing platforms and the growth and usage of the Internet, industries are moving towards a new era of technology. With this revolution, the IT infrastructure of industries is rapidly undergoing a continuous change. However, the insecure communication channel; intelligent adversaries in and out of the scene; and loopholes in the software and system development add complexity in deployment of the IT infrastructure in place. In addition, the heterogeneous service level requirements from the customers, service providers, users, along with implementation policies in industries add complexity to this problem. Hence, it is necessary to assess the risk associated with the deployment of the IT infrastructure in industries to ensure the security of the assets involved. In this chapter, we present an efficient risk assessment mechanism in IT infrastructure deployment in industries, which ensures a strong security perimeter over the underlying organizational resources.
IT基础架构中的风险评估
由于各个应用领域的数据和信息大规模数字化,普适计算平台的演进以及互联网的发展和使用,工业正在走向一个新的技术时代。随着这场革命,行业的IT基础设施正在迅速经历持续的变化。然而,不安全的通信信道;场景内外的智能对手;软件和系统开发中的漏洞增加了部署IT基础设施的复杂性。此外,来自客户、服务提供者、用户的异构服务级别需求,以及行业中的实现策略,都增加了这个问题的复杂性。因此,有必要评估与行业中it基础设施部署相关的风险,以确保所涉及资产的安全性。在本章中,我们提出了行业中IT基础设施部署的有效风险评估机制,该机制确保了底层组织资源的强大安全边界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信