...
首页> 外文期刊>Information systems security >Building an Automated Security Monitor
【24h】

Building an Automated Security Monitor

机译:构建自动化安全监控器

获取原文

摘要

No company can survive in the 1990s without the ability to rapidly access information from remote locations. Remote access unfortunately creates new opportunities to penetrate computer systems. It is not unusual for an Internet host owner to find that an unauthorized person has been browsing sensitive files. Hackers can hit hundreds of systems at once, pulling information back to an intermediate location for analysis. Although the hacking of mainframes is less common than that of micro- and minicomputers, it is still an important concern, given that by one estimate, 80 of all critical corporate data is stored on IBM mainframe systems.
机译:在 1990 年代,任何公司都无法从远程位置快速访问信息。不幸的是,远程访问为渗透计算机系统创造了新的机会。互联网主机所有者发现未经授权的人一直在浏览敏感文件的情况并不少见。黑客可以同时攻击数百个系统,将信息拉回中间位置进行分析。尽管大型机的黑客攻击不如微型和小型计算机常见,但它仍然是一个重要的问题,因为据估计,80% 的关键企业数据都存储在 IBM 大型机系统上。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号