Security mistakes in information system deployment projects

نویسندگان

  • Teodor Sommestad
  • Mathias Ekstedt
  • Hannes Holm
  • Muhammad Afzal
چکیده

To secure information systems from malicious attacks have become an increasingly important task in most businesses today. A common way of approaching this problem is to think of securing systems as removing vulnerabilities in them. What defines a vulnerability is however multifaceted. Vulnerabilities are often seen as mistakes made during the development of the system and that have potentially both related exploits and patches. This type of vulnerabilities can for instance be found in databases such as the National Vulnerability Database (NVD) (NIST 2010). From a more conceptual perspective, a vulnerability could also have its root cause in mistakes performed later in the information system lifecycle. Systems may not be configured appropriately in relation to their usage and systems which lack all necessary security mechanisms may not be appropriately supported and protected by countermeasure mechanisms. Classical examples of such vulnerabilities are poorly configured firewall rules and usage of weak passwords. Of course, since the security area is (in-)famous for suffering from the weakest link syndrome, the consequences of any vulnerability could potentially be equally devastating.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach

Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...

متن کامل

Escalation and premature termination in MIS projects: the role of real options

Purpose of the paper This paper examines how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems (MIS) projects. Design/methodology/approach We compare the implications of psychological and economic escalation theories with lessons from the real option theory as applied to MIS projects. Then, we examine published ...

متن کامل

The Relationship Between Management Information System Deployment with Conflict Management Styles in Educational and Executive Sports Managers (Case Study: Tehran municipality)

 Organizational conflict is a fundamental and pervasive part of our organizational life. Organizations generally fail in competitive environments if there is less conflict. Managers can use Conflict to increase the effectiveness of the organization. The purpose of this study was to investigate the relationship between management information system (MIS) deployment with conflict management styl...

متن کامل

Secure Communication in Vehicular Networks

Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The neardeployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality situations and field-operational trials. The contribution of our work is in this direction: We present a ...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2011