波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

百家乐游戏机说明书| 百家乐官网技巧| 三都| 百家乐官网庄闲规则| 真人百家乐官网蓝盾娱乐网| 真人百家乐澳门娱乐城| 大发888代充信用卡| 广饶县| 百家乐官网软件购买| 百家乐官网5式直缆打法| 视频百家乐官网是真是假| 百家乐网络赌博网| 新巴尔虎左旗| 澳门百家乐官网群策略| 百家乐官网桌手机套| 百家乐官网博彩网太阳城娱乐城| 博彩百家乐五2013124预测| 大发888客服电话 导航| 百家乐官网是片人的吗| 在线百家乐官网作弊| 威尼斯人娱乐场cqsscgw88| 百家乐官网开户平台| 百家乐冯氏坐庄法| 大发888投注明升网址| 乐中百家乐的玩法技巧和规则| bet365体育在线下载| 大发888皇冠娱乐城| 百家乐官网账号变动原因| CEO百家乐现金网| 盛京棋牌网| 万人迷百家乐官网的玩法技巧和规则 | 二八杠论坛| 百家乐官网怎么刷反水| 百家乐电子路单下载| 德州扑克的规则| 百家乐官网赌场凯时娱乐| 百家乐出千桌| 玩百家乐官网技巧巧| 大发888娱乐方| 帝王百家乐官网的玩法技巧和规则| 网络棋牌游戏平台|