波音游戏-波音娱乐城赌球打不开

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

百家乐官网15人桌| 百家乐官网赌博现金网平台排名| 至尊百家乐facebook| 百家乐官网单机游戏免费| 蓝盾百家乐官网代理| 百家乐游戏辅助| 百家乐电投网站| 澳门博彩| 财神百家乐官网的玩法技巧和规则 | 百家乐连开6把小| 博狗投注| 做生意风水关键吗| 永盈会娱乐场官网| 沁水县| 罗马百家乐娱乐城| 威尼斯人娱乐网反| 百家乐官网三号的赢法| 蓝盾百家乐具体玩法| 郸城县| 百家乐娱乐真钱游戏| 赌博技术| 博九百家乐游戏| 德州扑克 玩法| 风水24山子怎么读| 大发扑克网| 易胜博百家乐下载| 百家乐真人游戏网| bet365投注网| 包赢百家乐官网的玩法技巧和规则 | 龙虎斗游戏| 真人百家乐代理分成| 高要市| 新全讯网网站xb112| 都坊百家乐官网的玩法技巧和规则| 送现金百家乐的玩法技巧和规则 | 二八杠视频| 百家乐代理占成| 百家乐官网手机投注| 百家乐筹码皇冠| 百家乐投注平台| 太阳城百家乐官网手机投注|