TITLE

The Case For Automation In Security

AUTHOR(S)
May, John O.
PUB. DATE
July 2004
SOURCE
Business Communications Review;Jul2004, Vol. 34 Issue 7, p64
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on computer security. With all the new computer viruses, trojans, buggy software and disgruntled employees, breakdowns in security are becoming a fact of life in corporate networks. Many organizations believe that even if their intrusion detection, filtering and firewall solutions are not 100 percent effective, these will at least provide enough time for security specialists to figure things out. Since critical interdependencies drive the need for a single point of control, security operations must take the lead in coordinating the automation effort in a large operation. Automation not only shortens reaction time, it also provides a framework for rigorous validation, testing, and improvement. It can substantially reduce the cost of incidents and the risks associated with manual and ad hoc reactions. Automation is best used on the building blocks of a response to a security incident for example, bringing down an enterprise resource planning (ERP) system, or increasing the protection algorithm to a database, or even switching core applications to a backup site.
ACCESSION #
13771409

 

Related Articles

  • Are you safe from infection?  // Cabinet Maker;7/15/2005, Issue 5447, p29 

    Presents steps in the prevention and detection of computer viruses. Advantage of installing an anti-virus software; Importance of filtering malicious emails to prevent virus threats; Need for the creation of backup data to avoid information loss. INSET: Great pretenders.

  • Reply to ‘Comment on “A Framework for Modelling Trojans and Computer Virus Infection”’ by E. Mäkinen. Cohen, Fred // Computer Journal;Jul2001, Vol. 44 Issue 4, p326 

    The article discusses the reaction of the author about a comment to an article titled "A Framework for Modelling Trojans and Computer Virus Infection." The author stresses that the comment was able to detail out the questionable conclusions of the article. The author also cites that the article...

  • How to Keep Your Campus Safe from Infection. Brown, Scott // T H E Journal;Aug2005, Vol. 33 Issue 1, p27 

    Presents information on the effectiveness of several anti-virus software in school computers. Anti-virus Version 3.86.2 from Sophos; VirusScan 9.0 from McAfee; eTrust Antivirus Version 7.1 from Computer Associates; Anti-Virus Personal 5.0 from Kaspersky.

  • Steps to save loved ones from various online evils. Audy, Marc // Fort Worth Business Press;6/11/2004, Vol. 17 Issue 24, p49 

    Discusses the steps to prevent the attack of various Internet viruses. Benefits of using anti-spyware software; Solutions recommended for complete Internet security; Cost of installing computer security software.

  • Antiviral Shields. Branwyn, Gareth; Clabaugh, Gavin // Futurist;Jan/Feb89, Vol. 23 Issue 1, p38 

    Focuses on the development of computer programs designed to detect computer viruses. Details of the program called C-4, which is known as an antiviral shield; Details of the testing procedure to determine the product's effectiveness; Cost and features of the software.

  • LEADERBOARD.  // InfoWorld;8/30/2004, Vol. 26 Issue 35, p48 

    This article presents a summary of reviews for several anti-virus solutions that are available in the U.S. market.

  • Does Your Online Profile Say Something You Wouldn't? Brandt, Andrew // PCWorld;Aug2004, Vol. 22 Issue 8, p50 

    Malicious hackers can get access to a profile page in a couple of ways. Some Trojan horse programs, spread through regular e-mail or through the instant messaging service of the Internet service provider America Online (AOL), can log keystrokes as an AOL subscriber enters their user name and...

  • Staying Safe Online. Greenberg, Pam // State Legislatures;Feb2006, Vol. 32 Issue 2, p32 

    The article presents tips on eliminating spam, viruses and spyware. Computer users can reduce the amount of spam they receive by limiting the release and availability of their e-mail address on Web sites, subscribing mailing lists and when purchasing items or subscribing to services. It is also...

  • LEARN THE TERMS.  // State Legislatures;Feb2006, Vol. 32 Issue 2, p33 

    The article defines the terms related to computer security. Phishing is a scam that involves Internet fraudsters who send spam or pop-up messages to obtain personal information from unsuspecting victims. Spam is an unsolicited commercial e-mail that are often sent in bulk quantities. Worm is a...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics