Security mistakes in information system deployment projects
نویسندگان
چکیده
To secure information systems from malicious attacks have become an increasingly important task in most businesses today. A common way of approaching this problem is to think of securing systems as removing vulnerabilities in them. What defines a vulnerability is however multifaceted. Vulnerabilities are often seen as mistakes made during the development of the system and that have potentially both related exploits and patches. This type of vulnerabilities can for instance be found in databases such as the National Vulnerability Database (NVD) (NIST 2010). From a more conceptual perspective, a vulnerability could also have its root cause in mistakes performed later in the information system lifecycle. Systems may not be configured appropriately in relation to their usage and systems which lack all necessary security mechanisms may not be appropriately supported and protected by countermeasure mechanisms. Classical examples of such vulnerabilities are poorly configured firewall rules and usage of weak passwords. Of course, since the security area is (in-)famous for suffering from the weakest link syndrome, the consequences of any vulnerability could potentially be equally devastating.
منابع مشابه
Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach
Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...
متن کاملEscalation and premature termination in MIS projects: the role of real options
Purpose of the paper This paper examines how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems (MIS) projects. Design/methodology/approach We compare the implications of psychological and economic escalation theories with lessons from the real option theory as applied to MIS projects. Then, we examine published ...
متن کاملThe Relationship Between Management Information System Deployment with Conflict Management Styles in Educational and Executive Sports Managers (Case Study: Tehran municipality)
Organizational conflict is a fundamental and pervasive part of our organizational life. Organizations generally fail in competitive environments if there is less conflict. Managers can use Conflict to increase the effectiveness of the organization. The purpose of this study was to investigate the relationship between management information system (MIS) deployment with conflict management styl...
متن کاملSecure Communication in Vehicular Networks
Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The neardeployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality situations and field-operational trials. The contribution of our work is in this direction: We present a ...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2011