...
首页> 外文期刊>Annual review of communications >Maintaining Normal Communication Operations by Reducing Denial of Service Effects by Worms and Viruses: A Case Study
【24h】

Maintaining Normal Communication Operations by Reducing Denial of Service Effects by Worms and Viruses: A Case Study

机译:通过减少蠕虫和病毒对服务的影响来维持正常的通信运营:一个案例研究

获取原文
获取原文并翻译 | 示例

摘要

One of the chief concerns in the relatively open architecture of academia centers on issues of information technology (IT) security. Security against vulnerabilities presents a formidable challenge wherever computing technology is used, especially in large networked environments that serve both to secure information and also to provide reliable and safe communication and access that goes beyond the managed network, such as corporations and universities. The Computer Emergency Response Team's (CERT/CC) most recent statistics report 2,683 security vulnerabilities during the first three quarters of 2004; by 2004, security incident reports had become so numerous that CERT has stopped reporting their number. Such reports had increased six-fold, from 21,756 in the year 2000 to 137,529 in 2003, and the widespread use of automated attack tools have now made it nearly impossible to assess the number of separate security incidents in 2004. It is difficult, if not impossible, for any IT administrator to review, evaluate, and address each vulnerability. The CERT group calculated the time it would take one IT administrator to spend five minutes reviewing the description of each of the last year's security alerts and installing required patches, even if only 1 percent olf those alerts applies to her specific IT infrastructure. Assuming it takes one hour to evaluate, test, and apply a required patch (this can drop for large installations using automated patching tools), it would take more than 500 hours to review each alert and install patches for 1 percent of them. This amounts to more than 25 percent of a full-time IT administrator's total hours during the year (Security Newsletter, 2004). Furthermore, the time lag between a security bulletin and a malicious exploit of the vulnerability is often measured in just hours or days. This paper describes how the IT division at Middle Tennessee State University (MTSU) has adapted its data communications network to changes in the security environment. Administering and safeguarding an academic network requires attention to two disparate goals: free and open access for faculty, staff, students, and visitors, to internal and external resources, along with excellent security and reliability.
机译:学术界相对开放的体系结构中的主要问题之一是信息技术(IT)安全问题。无论在何处使用计算技术,针对漏洞的安全性都是一个巨大的挑战,尤其是在大型网络环境中,这种环境既可以保护信息安全,又可以提供超出托管网络范围的可靠和安全的通信和访问,例如公司和大学。计算机紧急响应小组(CERT / CC)的最新统计数据表明,2004年前三个季度中有2683个安全漏洞。到2004年,安全事件报告的数量已变得如此之多,以至于CERT已停止报告其数量。这样的报告增加了六倍,从2000年的21,756个增加到2003年的137,529个,并且自动攻击工具的广泛使用现在使几乎不可能在2004年评估单独的安全事件的数目。任何IT管理员都无法审查,评估和解决每个漏洞。 CERT小组计算了一名IT管理员花费五分钟的时间来检查去年的每个安全警报的描述并安装所需的补丁程序,即使这些警报仅占其特定IT基础结构的百分之一。假设评估,测试和应用所需的修补程序需要一个小时(对于使用自动修补工具的大型安装,此修补程序可能会掉落),则审查每个警报并安装其中1%的修补程序将花费500多个小时。这相当于一年中全职IT管理员总工作时间的25%以上(安全通讯,2004年)。此外,安全公告和对该漏洞的恶意利用之间的时滞通常仅在数小时或数天之内即可测出。本文描述了田纳西州立大学(MTSU)的IT部门如何使其数据通信网络适应安全环境的变化。管理和维护学术网络需要注意两个完全不同的目标:教师,教职员工,学生和访客可以自由和开放地访问内部和外部资源,以及出色的安全性和可靠性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号