百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

II. Risks of Hacking Protection in Universities

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
 

1.  Excessive Reporting and False Positives

An improperly configured Intrusion Detection System (IDS) may generate significant number of false positives that overwhelm universities' IT security resources and obscure valid hits. Over-monitoring of data volume or keywords / data patterns can easily exhaust limited resources and result in delay or even interruption to service provision.

2.  Improperly Configured Security Infrastructure

When a security infrastructure is not able to handle the amount of network traffic, due to either insufficient consideration of traffic volume during the design stage or increased network traffic over time, some network packets may be missed or dropped, allowing certain data to pass uninspected. It may render hacking protection ineffective when unauthorised transmission of sensitive data to external parties is ignored.

3.  Conflicts with System Performance and Operations

Hacking protections, especially intrusion detection systems, can cause compatibility issues when conflicting with other systems and software. For example, some application software cannot run properly on encrypted hard drive. Applications errors or performance degradation are two common results of such conflicts. In worst case, the compatibility issues may cause the abnormal termination of other security controls and expose universities' information system to even great risks.

4.  Over Protection against Hacking

Universities must pay extra attention to strike a balance between risk of exploitation and operational level. Otherwise, inadequately tuned security infrastructure may cause disruption of universities' operation, waste of staff or students' time, damage to relationship with external parties such as contractors and the public. E.g. blocking employees sending sensitive data to authorised external parties; disrupting normal e-mail services used by universities.


Reference:
JUCC IT newsletter Issue #5 - Data Leakage Protection
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

云林县| 百家乐官网赌场论坛| 自贡百家乐赌场娱乐网规则| 大发8888娱乐场| 百家乐官网高手论坛| 辽阳县| 六合彩图纸| 大发888在线娱乐二十一点| 百家乐的如何玩| 百家乐官网技巧论坛| 威尼斯人娱乐城免费注册| 菲律宾百家乐开户| 百家乐庄闲必赢| 太阳百家乐官网管理网| 余江县| 188金宝博备用网址| 仁怀市| 大发888在线娱乐百家乐| 威尼斯人娱乐城筹码| 博彩套利| 十三张百家乐的玩法技巧和规则| 百家乐二号博彩正网| 十六浦百家乐官网的玩法技巧和规则 | 百家乐赌场导航| 百家乐软件稳赚| 澳门百家乐赌场娱乐网规则| 362百家乐的玩法技巧和规则| 免费百家乐缩水工具| 宝马会百家乐现金网| 任我赢百家乐软件中国有限公司| 百家乐连黑记录| 送彩金百家乐平台| 百家乐小游戏单机版| 全讯网zq06| 大发888 xp缺少 casino| 大发888线上娱乐城加盟合作| 百家乐官网有诈吗| 利记百家乐现金网| 威尼斯人娱乐城信誉| 百家乐官网发牌千数| 澳门百家乐官网心德|