波音游戏-波音娱乐城赌球打不开

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

百家乐官网公式论坛| 德州扑克游戏平台| 百家乐官网技巧开户网址| 百家乐游戏源码手机| bet365注册 jxhymp| 百家乐官网自动投注| 百家乐投注怎么样| 百家乐影院| 百家乐赢钱公式| 百家乐官网牡丹娱乐城| 大发888游戏网页版| 百家乐官网赌场代理合作| 百家乐游戏方法| 大发888 大发国际| 百家乐官网烫金筹码| 百家乐游戏下载| 大庆市| 网上百家乐的赌博网站| 总统线上娱乐城| 博彩百家乐官网五2013124预测| 全讯网3344555.com| 波浪百家乐官网测试| 百家乐追号软件| 百家乐攻略投注法| 德州扑克发牌规则| 风水学24山看水法| 清河县| 百家乐路技巧| 线上百家乐官网是如何作弊| 永利高网址| 大发888bet娱乐城| 优博百家乐的玩法技巧和规则| 黄金城百家乐官网游戏| 大庆冠通棋牌世界| 大发888注册送彩金| 百家乐投注之对冲投注| 网上百家乐官网赌场娱乐网规则| 百家乐官网软件辅助| 银河国际| 威尼斯人娱乐城总部| 乐天堂百家乐娱乐场|