Managing vulnerabilities in networked systems
نویسندگان
چکیده
منابع مشابه
Managing Vulnerabilities in Networked Systems
32 Computer Managing Vulnerabilities in Networked Systems Most organizations recognize the importance of cyber security and are implementing various forms of protection. However, many are failing to find and fix known security problems in the software packages they use as the building blocks of their networks and systems, a vulnerability that a hacker can exploit to bypass all other efforts to ...
متن کاملManaging Information and Storage in Networked Cyber-Physical Systems
The integration of computer-centric control and physical systems is becoming more entrenched, as we see these cyber-physical systems (CPS) appearing in a wide variety of systems including medical systems, industrial monitoring, agriculture, avionics, amongst others. However, we see the following limitations to the wide-spread adoption of CPSs, namely inadequate information and data capabilities...
متن کاملManaging Information in Networked and Multi-agent Control Systems
Traditional feedback control systems give little attention to issues associated with the flow of information through the feedback loop. Typically implemented with dedicated communication links that deliver nearly precise, reliable, and non-delayed information, researchers have not needed to concern themselves with issues related to quantized, delayed, and even lost information. With the advent ...
متن کاملManaging Multiple Communication Methods in High-Performance Networked Computing Systems
Modern networked computing environments and applications often require|or can bene t from|the use of multiple communication substrates, transport mechanisms, and protocols, chosen according to where communication is directed, what is communicated, or when communication is performed. We propose techniques that allow multiple communication methods to be supported transparently in a single applica...
متن کاملManaging File Subsystem Data Streams for Databases on Networked Systems
One important activity for networked database systems that distribute data across several workstations is moving data between the le and network subsystems. It is possible to create data streams in the operating system kernel. If provided on a system, they allow user level processes to request transfer of data without having to copy it into the user space. This is particularly useful for data w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer
سال: 2001
ISSN: 0018-9162
DOI: 10.1109/2.963441