...
首页> 外文期刊>Computer Economics Report >Combating Back Door Vulnerabilities in Data Center Procedures
【24h】

Combating Back Door Vulnerabilities in Data Center Procedures

机译:消除数据中心程序中的后门漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

Although IT professionals usually adhere to strict security guidelines with the complex development, implementation, and management aspects of their jobs, they sometimes drop their guard in relation to security with some of the more mundane job duties such as data center procedures. The challenge is that these procedures are generally unsophisticated to implement, yet can be very complex to secure. This article highlights the security weaknesses that can be created by such administrative procedures and outlines common sense management practices that can close such back door vulnerabilities. Eliminating back door vulnerabilities is becoming an important goal for the security program. Cyber-criminals have begun to target specific organizations for financial gain, and they are actively searching for ways to gain access to financial and personal information contained in corporate systems. Furthermore, governmental regulations such as Sarbanes-Oxley and HIPAA require that organizations establish strong internal controls to mitigate the risk of information theft.
机译:尽管IT专业人员通常在工作的复杂开发,实施和管理方面都遵循严格的安全准则,但有时他们会在一些更平凡的工作职责(如数据中心程序)中放弃对安全的警惕。挑战在于这些程序通常不易于实施,但保护起来却非常复杂。本文重点介绍了此类管理过程可能造成的安全漏洞,并概述了可以消除此类后门漏洞的常识管理实践。消除后门漏洞已成为安全计划的重要目标。网络犯罪分子已经开始针对特定组织以获取经济利益为目标,并且他们正在积极寻找方法来获取对公司系统中包含的财务和个人信息的访问权。此外,诸如Sarbanes-Oxley和HIPAA之类的政府法规要求组织建立强有力的内部控制措施,以减轻信息盗窃的风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号