Protecting against Predatory Practices

نویسنده

  • C. Warren
چکیده

A major reason for security professionals not seeming able to protect fully against the rapidly changing threat environment and sophisticated attacks is that they often don’t have available the necessary application security data for detecting and responding to such increasingly stealthy attacks. Furthermore, easily generated application security data are generally not reported timely or accurately enough for appropriate preventative action. In this article, we describe the issues confronting those attempting to create, collect, report, and respond to data–and which are more useful but harder to come by. We also suggest how these impediments might be overcome.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting against Predatory Practices

Software security represents a major concern as cyber attacks continue to grow in number and sophistication. One security-weakening factor is related to the standardized software ecosystem that facilitates the spread of malware in systems that share common vulnerabilities. In this overview article, the main concepts associated with diversity and software redundancy are described in the perspect...

متن کامل

Examining publishing practices: moving beyond the idea of predatory open access

has been both overinclusive, encompassing practices that, while undesirable, are not malicious, and underinclusive, missing many exploitative practices outside the open access sphere. The article examines different business models for scholarly publishing and considers the potential for abuse with each model. After looking at the problems of both blacklists and so-called ‘whitelists’, the autho...

متن کامل

Roadmap to Stop the Predatory Journals: Author\'s Perspective

Recent disgracing reports are warning the scientific communities to think more about the solutions to win the battle against predatory journals and publishers. Current integrity and accuracy in science is a result of decades of honest works and publications which are an asset, now everyone as stakeholders of science should feel the responsibility to sustain its high privileged level. The ethica...

متن کامل

Guidelines for selecting journals that avoid fraudulent practices in scholarly publishing

In recent years, scholarly publishing has been faced with many distractive phenomena. Generally, most researchers are unaware of fraudulent practices now common to scholarly publishing and are at risk of becoming a victim of them. Editors also need to have sufficient knowledge about these practices. There are papers that try to increase awareness of authors about fraud in scholarly publishing, ...

متن کامل

Characterization of the first highly predatory Bdellovibrio bacteriovorus from Iran and its potential lytic activity against principal pathogenic Enterobacteriaceae

Objective(s): Bdellovibrio-and-like organisms (BALOs) are predatory prokaryotes that attack and kill other Gram-negative bacteria for growth and reproduction. This study describes the isolation, identification, biological properties, and bacteriolytic activity of the first Bdellovibrio bacteriovorus with a broad prey range from Iran.Materials and Meth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011