波音游戏-波音娱乐城赌球打不开

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

大发888娱乐城官| 同乐城百家乐现金网| 百家乐官网视频二人雀神| 广东百家乐官网网| 太阳城百家乐的破解| 田阳县| 墓地风水24山| 五河县| 天津水果机遥控器| 尊龙百家乐官网娱乐| 百家乐规律打| 梦幻城百家乐官网的玩法技巧和规则 | 大发888新址 | 百家乐真人游戏网上投注 | 新西兰百家乐的玩法技巧和规则| 视频百家乐官网平台出租| 大发888游戏平台 送1688元现金礼金领取 | 威尼斯人娱乐城官网lm0| 百家乐官网代理龙虎| 帝王百家乐新足球平台| 揭秘百家乐官网百分之50| 百家乐园好又多| 澳门百家乐官网游戏| 大发888信誉娱乐城管理| 西游记百家乐官网娱乐城| 石棉县| 真人百家乐分析软件是骗局| 申请百家乐官网会员送彩金| 百家乐官网美女荷官| 威尼斯人娱乐城003| 丽星百家乐官网的玩法技巧和规则| 网络百家乐官网免费试玩| 六合彩报纸| 百家乐翻天粤语下载| 百家乐官网官网站| 专业百家乐官网分析| 大发888客服咨询电话| 大发888吧| 真人游戏排行榜| 百家乐如何制| 国美百家乐的玩法技巧和规则 |