منابع مشابه
Configuration Management Security in Data Center Environments
Modern data centers need to manage complex, multi-level hardware and software infrastructures in order to provide a wide array of services flexibly and reliably. The emerging trends of virtualization and outsourcing further increase the scale and complexity of this management. In this chapter, we focus on the configuration management issues and expose a variety of attack and misconfiguration sc...
متن کاملSecurity for Automated, Distributed Configuration Management
Installation, configuration, and administration of desktop software is a non-trivial process. Even a simple application can have numerous dependencies on hardware, device drivers, operating system versions, dynamically linked libraries, and even on other applications. These dependencies can cause surprising failures during the normal process of installations, updates and re-configurations. Diag...
متن کاملDynamic Risk Measurement and Mitigation for Proactive Security Configuration Management
The factors on which security depends are of dynamic nature. These include emergence of new vulnerabilities and threats, policy structure and network traffic. Due to the dynamic nature of these factors, objectively identifying and measuring security metrics is a major challenge. However, such an evaluation can significantly help security professionals in decision making such as choosing between...
متن کاملSecurity configuration management in intrusion detection and prevention systems
This paper aims to study the impact of security enforcement levels on the performance and usability of an enterprise information system. We develop a new analytical model to investigate the relationship between the Intrusion Detection and Prevention System performance and the rules mode selection. In particular, we analyze the IDPS rulechecking process along with its consequent action on the re...
متن کاملImproving the Configuration Management of Large Network Security Systems
The security mechanisms employed in today’s networked environments are increasingly complex and their configuration management has an important role for the protection of these environments. Especially in large scale networks, security administrators are faced with the challenge of designing, deploying, maintaining, and monitoring a huge number of mechanisms, most of which have complicated and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Selected Areas in Communications
سال: 2009
ISSN: 0733-8716
DOI: 10.1109/jsac.2009.090403