波音游戏-波音娱乐城赌球打不开

II. Risk of Patch Management in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
 
Applying patches to software applications and hardware firmware may introduce additional risks to universities' IT environment because patches themselves are programs and may have their own set of vulnerabilities. Improper handling of patching process could also result in system crashes or damage hardware devices. Universities should consider the risks when implementing their patch management exercises:
 
1. Invalidated Patches
 
The source of each patch must be validated by examining the acquiring source and patch signature to ascertain only authenticated patches are applied to universities information systems. It has been reported that some scammers sent fake Microsoft security patch e-mails with malicious contents.
 
In addition, some complex patches require domain expertise to review certain pre/post-requisites and dependency metadata before the actual installation. Fail to do so may cause severe consequences, such as data corruption, unpredictable system behaviours or even service outage.
 
2. Inadequate Testing

Many universities' information systems are correlated and have interfaces among them to exchange data. Applying patches to one system in the production environment without sufficient testing performed may introduce adverse impact on the other applications, such as incompatible data formats, communication protocol or interface logic.
 
3. Downtime and Interruption
 
With the increase in program complexity, patches are released more rapidly and require longer time spent on installation onto the target information systems. Patching tasks, if not planned carefully, could lead to frequent interruption to universities' operations and prolonged service downtime due to large sizes of patches (e.g. service packs, software packages).
 
4. Vulnerabilities in Patch Management System / Tool
 
If a patch management system is used to enforce automated patching mechanism, the security vulnerabilities of its own might have impact on the other universities' information systems. A virus infected or breached patch management system will be a central distribution point that broadcast viruses and malware.
 
In addition, a patch management system protected with weak access controls creates additional channel for hackers to gain unauthorised access to universities' IT environment or launch attacks on the critical information systems.
 
5. Lack of Fallback Procedures
 
Sometimes the vendor may publish a patch that has flaws in it and results in various issues related to patched systems. If universities do not have the corresponding fallback procedures in place, the negative effect imposed by that problematic patch cannot be immediately reversed until the vendor issues another patch to fix the mistake.
 
6. Incorrect Identification and Installation

Detection and deployment of security patches is a critical part of the patch management process. Some sophisticated applications have functions embedded to detect applicable security patches and provide necessary guidelines on the patch installation procedures. Using alternative means to identify and install patches is dangerous since the accuracy and reliability will not be guaranteed by the vendors.

Related Article
 
Security patch results in blue screen of death, stops Windows from booting
 
One of the updates from February 2010's giant Patch Tuesday is wreaking havoc on some users Windows PCs by giving them the Blue
Screen of Death (BSOD), according to a thread on Microsoft Answers, the company's support forum.
 


 
百家乐官网平预测软件| 新葡京百家乐官网现金| 太阳城百家乐官网投注| 上海百家乐官网的玩法技巧和规则 | 百家乐官网新台第二局| 百家乐机械图片| KTV百家乐官网的玩法技巧和规则| 明光市| 百家乐庄闲必胜打| 百家乐下载游戏| 百家乐官网局部| 溧水县| 盈丰娱乐城| 威尼斯人娱乐电子游戏| 百家乐赌场技巧大全| 百家乐龙虎规则| 百家乐官网美女视频聊天| 宝都棋牌下载| 水果机器| 赌场百家乐实战| 百家乐大路小路| 阿玛尼百家乐官网的玩法技巧和规则| 澳门百家乐官网怎玩| 百家乐官网免费路单| 大发888-娱乐网| 百家乐软件辅助器| 百家乐棋牌游戏皇冠网| 百家乐官网黏土筹码| 百家乐官网游戏试玩免费| 顶旺娱乐| 晓游棋牌官网| 顶级赌场371betcwm| 大发888娱乐城下载最新版| 伟易博百家乐娱乐城 | 大西洋城娱乐| 大发娱乐场下载| 太阳城娱乐网88| 威尼斯人娱乐城真实网址| 梦幻城百家乐的玩法技巧和规则 | 曼哈顿百家乐娱乐城| 网络百家乐大转轮|