Measurement of Security Dangers in University Network
نویسندگان
چکیده
Today’s universities are on the forefront of technological advancement which makes University’s computing environment particularly vulnerable because in contrast to hacking targets like banks and others, college and university computing environments are often large open networks. This paper assessed the security threats evolve specifically in University’s information technology environment; and proposes risk management framework for University computing environment, to guide security and risk executives through the process of network security management. The proposed model lower the risk of security breach by supporting three phase activities; the first phase identified the threats and vulnerabilities in order to know the weak point in educational environment, the second phase focuses on the highest risk which means it prioritize what matters most and create actionable remediation plan, the third phase of risk assessment model recognizes the vulnerability management compliance requirement in order to improve organization’s security position. The proposed framework can be applied to any higher educational organization or University’s IT environments; it enables Universities to stay a step ahead of security threats and also to get more value from their security budget, by
منابع مشابه
Detecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملKeeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment
Many information security officers or network system administrators at universities and colleges face the problem of not knowing when students are utilizing the campus network in ways that can affect the image of the university or even cause monetary losses. Improper use of the network could either be willful and maliciously done or perhaps just naïve students unaware of viruses on their comput...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کامل