波音游戏-波音娱乐城赌球打不开

II. Risk of Patch Management in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
 
Applying patches to software applications and hardware firmware may introduce additional risks to universities' IT environment because patches themselves are programs and may have their own set of vulnerabilities. Improper handling of patching process could also result in system crashes or damage hardware devices. Universities should consider the risks when implementing their patch management exercises:
 
1. Invalidated Patches
 
The source of each patch must be validated by examining the acquiring source and patch signature to ascertain only authenticated patches are applied to universities information systems. It has been reported that some scammers sent fake Microsoft security patch e-mails with malicious contents.
 
In addition, some complex patches require domain expertise to review certain pre/post-requisites and dependency metadata before the actual installation. Fail to do so may cause severe consequences, such as data corruption, unpredictable system behaviours or even service outage.
 
2. Inadequate Testing

Many universities' information systems are correlated and have interfaces among them to exchange data. Applying patches to one system in the production environment without sufficient testing performed may introduce adverse impact on the other applications, such as incompatible data formats, communication protocol or interface logic.
 
3. Downtime and Interruption
 
With the increase in program complexity, patches are released more rapidly and require longer time spent on installation onto the target information systems. Patching tasks, if not planned carefully, could lead to frequent interruption to universities' operations and prolonged service downtime due to large sizes of patches (e.g. service packs, software packages).
 
4. Vulnerabilities in Patch Management System / Tool
 
If a patch management system is used to enforce automated patching mechanism, the security vulnerabilities of its own might have impact on the other universities' information systems. A virus infected or breached patch management system will be a central distribution point that broadcast viruses and malware.
 
In addition, a patch management system protected with weak access controls creates additional channel for hackers to gain unauthorised access to universities' IT environment or launch attacks on the critical information systems.
 
5. Lack of Fallback Procedures
 
Sometimes the vendor may publish a patch that has flaws in it and results in various issues related to patched systems. If universities do not have the corresponding fallback procedures in place, the negative effect imposed by that problematic patch cannot be immediately reversed until the vendor issues another patch to fix the mistake.
 
6. Incorrect Identification and Installation

Detection and deployment of security patches is a critical part of the patch management process. Some sophisticated applications have functions embedded to detect applicable security patches and provide necessary guidelines on the patch installation procedures. Using alternative means to identify and install patches is dangerous since the accuracy and reliability will not be guaranteed by the vendors.

Related Article
 
Security patch results in blue screen of death, stops Windows from booting
 
One of the updates from February 2010's giant Patch Tuesday is wreaking havoc on some users Windows PCs by giving them the Blue
Screen of Death (BSOD), according to a thread on Microsoft Answers, the company's support forum.
 


 
百家乐赢退输进有哪些| 太子娱乐城官网| 百家乐噢门棋牌| 大发888娱| 马尼拉百家乐的玩法技巧和规则| 赌博百家乐有技巧吗| 杨公24山| 宝马会百家乐官网娱乐城| 百家乐官网庄闲| 网上真钱梭哈| 府谷县| 壶关县| 百家乐官网一代龙虎机| 百家乐官网单跳投注法| 百家乐官网号论坛博彩正网| 沽源县| 视频百家乐官网平台出租| 百家乐官网事电影| 赌场百家乐官网技巧| 百家乐官网打印机分析| 一直对百家乐官网很感兴趣.zibo太阳城娱乐城 | 百家乐境外赌博| 百家乐投注技巧球讯网| 做生意怕路冲吗| 百家乐和| 大发888 娱乐| 土默特右旗| 凯时百家乐官网技巧| 网络百家乐官网破解平台| 线上百家乐官网平台| 金字塔百家乐官网的玩法技巧和规则 | 百家乐官网庄闲统计数| 百家乐高手论坮| 百家乐全透明牌靴| 诸子百家乐的玩法技巧和规则 | 百家乐官网的胜算法| 利高百家乐官网的玩法技巧和规则| 广州百家乐官网赌场娱乐网规则 | 蓝盾百家乐官网洗码| 玩机器百家乐心得| sz新全讯网网站112|