波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

II. Risk of Patch Management in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
 
Applying patches to software applications and hardware firmware may introduce additional risks to universities' IT environment because patches themselves are programs and may have their own set of vulnerabilities. Improper handling of patching process could also result in system crashes or damage hardware devices. Universities should consider the risks when implementing their patch management exercises:
 
1. Invalidated Patches
 
The source of each patch must be validated by examining the acquiring source and patch signature to ascertain only authenticated patches are applied to universities information systems. It has been reported that some scammers sent fake Microsoft security patch e-mails with malicious contents.
 
In addition, some complex patches require domain expertise to review certain pre/post-requisites and dependency metadata before the actual installation. Fail to do so may cause severe consequences, such as data corruption, unpredictable system behaviours or even service outage.
 
2. Inadequate Testing

Many universities' information systems are correlated and have interfaces among them to exchange data. Applying patches to one system in the production environment without sufficient testing performed may introduce adverse impact on the other applications, such as incompatible data formats, communication protocol or interface logic.
 
3. Downtime and Interruption
 
With the increase in program complexity, patches are released more rapidly and require longer time spent on installation onto the target information systems. Patching tasks, if not planned carefully, could lead to frequent interruption to universities' operations and prolonged service downtime due to large sizes of patches (e.g. service packs, software packages).
 
4. Vulnerabilities in Patch Management System / Tool
 
If a patch management system is used to enforce automated patching mechanism, the security vulnerabilities of its own might have impact on the other universities' information systems. A virus infected or breached patch management system will be a central distribution point that broadcast viruses and malware.
 
In addition, a patch management system protected with weak access controls creates additional channel for hackers to gain unauthorised access to universities' IT environment or launch attacks on the critical information systems.
 
5. Lack of Fallback Procedures
 
Sometimes the vendor may publish a patch that has flaws in it and results in various issues related to patched systems. If universities do not have the corresponding fallback procedures in place, the negative effect imposed by that problematic patch cannot be immediately reversed until the vendor issues another patch to fix the mistake.
 
6. Incorrect Identification and Installation

Detection and deployment of security patches is a critical part of the patch management process. Some sophisticated applications have functions embedded to detect applicable security patches and provide necessary guidelines on the patch installation procedures. Using alternative means to identify and install patches is dangerous since the accuracy and reliability will not be guaranteed by the vendors.

Related Article
 
Security patch results in blue screen of death, stops Windows from booting
 
One of the updates from February 2010's giant Patch Tuesday is wreaking havoc on some users Windows PCs by giving them the Blue
Screen of Death (BSOD), according to a thread on Microsoft Answers, the company's support forum.
 


 
澳门百家乐赌| 菲律宾百家乐官网娱乐平台| 百家乐平玩法几副牌| 百家乐官网公式计算| 百家乐官网备用网址| 威尼斯人娱乐场55556| 盈禾| 百家乐官网qq游戏| 百家乐稳赢秘诀教学| 黔南| 百家乐波音平台路单| 皇博| 博发百家乐官网的玩法技巧和规则 | 百家乐牌| 澳门葡京赌场美女| 千亿百家乐官网的玩法技巧和规则 | 百家乐官网1326投注| 线上百家乐平玩法| 百家乐官网板路| 全讯网开户| G3百家乐官网的玩法技巧和规则 | 百家乐15人桌| 尊龙国际| 澳门百家乐什么规则| 游戏房百家乐官网赌博图片| 百家乐计划软件| 肯博百家乐官网的玩法技巧和规则| 棋牌下载| 百家乐注册开户| 百家乐官网关键词| 德州扑克小游戏| 百家乐假在哪里| 丹巴县| 奥斯卡百家乐官网的玩法技巧和规则 | 威尼斯人娱乐场 28| 百家乐高手qq| 百家乐官网下载免费软件| 太阳城御园| 真钱百家乐游戏排行| 百家乐官网大西洋城| 漳浦县|