波音游戏-波音娱乐城赌球打不开

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

太阳百家乐破解| 大发888存款| 打百家乐的介绍| 百家乐官网博彩软件| tt娱乐城备用网| 百家乐技巧公司| 百家乐拍是什么| 百家乐官网赌场破解| 网上百家乐官网正规代理| 沂源县| 威尼斯人娱乐代理注册| 做生意门面对着什么方向好| 百家乐官网规律打| 运城百家乐官网蓝盾| 广州百家乐官网酒店用品制造有限公司| 澳门金莎娱乐城| 博发娱乐| 百家乐怎么做弊| 福布斯百家乐的玩法技巧和规则| 百家乐平台出租家乐平台出租| 百家乐澳门色子| 百家乐平玩法lm0| 广州百家乐官网娱乐场开户注册| 网站百家乐官网假| 百家乐官网那个平台好| 百家乐官网公开| 百家乐官网讲坛汉献| 国际娱百家乐官网的玩法技巧和规则 | 太阳城百家乐娱乐开户| 百家乐官网电子路单下载| 澳门百家乐官网鸿福厅| 玩百家乐官网澳门皇宫娱乐城 | 百家乐澳门百家乐| 百家乐国际娱乐网| 百家乐六手变化混合赢家打| sz新全讯网xb112| 太阳城娱乐城88| 索雷尔百家乐官网的玩法技巧和规则 | 百家乐官网玩牌| 百家乐官网论坛在线提供| 百家乐官网免费改单|