构建自动安全监视器

James E. Molini
{"title":"构建自动安全监视器","authors":"James E. Molini","doi":"10.1080/19393559308551331","DOIUrl":null,"url":null,"abstract":"No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an Internet host owner to find that an unauthorized person has been browsing sensitive files. Hackers can hit hundreds of systems at once, pulling information back to an intermediate location for analysis. Although the hacking of mainframes is less common than that of micro- and minicomputers, it is still an important concern, given that by one estimate, 80% of all critical corporate data is stored on IBM mainframe systems. In response to these threats, a security manager may spend years implementing rigorous policies and controls for routine system auditing and violation reporting. Yet, in an ever-changing environment, how can the security manager be assured that these controls really work to protect critical information? Demand for quick system access and remote use continues to chip away at...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Building an Automated Security Monitor\",\"authors\":\"James E. Molini\",\"doi\":\"10.1080/19393559308551331\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an Internet host owner to find that an unauthorized person has been browsing sensitive files. Hackers can hit hundreds of systems at once, pulling information back to an intermediate location for analysis. Although the hacking of mainframes is less common than that of micro- and minicomputers, it is still an important concern, given that by one estimate, 80% of all critical corporate data is stored on IBM mainframe systems. In response to these threats, a security manager may spend years implementing rigorous policies and controls for routine system auditing and violation reporting. Yet, in an ever-changing environment, how can the security manager be assured that these controls really work to protect critical information? Demand for quick system access and remote use continues to chip away at...\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/19393559308551331\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393559308551331","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如果没有从偏远地区快速获取信息的能力,没有一家公司能在20世纪90年代生存下来。不幸的是,远程访问为渗透计算机系统创造了新的机会。对于互联网主机所有者来说,发现未经授权的人一直在浏览敏感文件并不罕见。黑客可以一次攻击数百个系统,将信息拉回中间位置进行分析。尽管对大型机的黑客攻击不如对微型和小型机的黑客攻击常见,但它仍然是一个重要的问题,因为据估计,80%的关键企业数据都存储在IBM大型机系统上。为了应对这些威胁,安全管理人员可能会花费数年时间来实现严格的策略和控制,以进行常规的系统审计和违规报告。然而,在不断变化的环境中,安全管理人员如何确保这些控制措施能够真正保护关键信息呢?对快速系统访问和远程使用的需求继续削弱……
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Building an Automated Security Monitor
No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an Internet host owner to find that an unauthorized person has been browsing sensitive files. Hackers can hit hundreds of systems at once, pulling information back to an intermediate location for analysis. Although the hacking of mainframes is less common than that of micro- and minicomputers, it is still an important concern, given that by one estimate, 80% of all critical corporate data is stored on IBM mainframe systems. In response to these threats, a security manager may spend years implementing rigorous policies and controls for routine system auditing and violation reporting. Yet, in an ever-changing environment, how can the security manager be assured that these controls really work to protect critical information? Demand for quick system access and remote use continues to chip away at...
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信