Abstract
Every day seems to bring news of another dramatic and high-profile security incident, whether it is the discovery of longstanding vulnerabilities in widely used software such as OpenSSL or Bash, or celebrity photographs stolen and publicized. There seems to be an infinite supply of zero-day vulnerabilities and powerful state-sponsored attackers. In the face of such threats, is it even worth trying to protect your systems and data? What can systems security designers and administrators do?
- Computer Security Resource Center. 2014. Role based access control (RBAC) and role based security. National Institute of Standards and Technology, Computer Security Division; http://csrc.nist.gov/groups/SNS/rbac/.Google Scholar
- Hockenson, L. Facebook explains the cause behind its early Thursday downtime. Gigaom; https://gigaom.com/2014/06/19/facebook-explains-the-cause-behind-its-early-thursday-downtime/.Google Scholar
- Moscaritolo, A. 2014. Verizon billing system hit by major outage. PC Mag UK; http://uk.pcmag.com/news/33726/verizon-billing-system-hit-by-major-outage.Google Scholar
- Wikipedia. 2012 RBS Group computer system problems; http://en.wikipedia.org/wiki/2012_RBS_Group_computer_system_problems.Google Scholar
Index Terms
- Internal Access Controls: Trust, but Verify
Recommendations
The Impact of Information Technology Internal Controls on Firm Performance
Since the introduction of the Sarbanes-Oxley SOX Act in 2002, companies have begun to place more emphasis on information technology IT internal controls. IT internal controls are policies that provide assurance that technical systems operate as intended,...
Opportunistic spectrum access: challenges, architecture, protocols
WICON '06: Proceedings of the 2nd annual international workshop on Wireless internetWe consider the concept of opportunistic spectrum access (OSA) -- whereby radios identify unused portions of licensed spectrum, and utilize that spectrum without adverse impact on the primary licensees. OSA allows both dramatically higher spectrum ...
A Control-Data-Mapping Entity-Relationship Model for Internal Controls Construction in Database Design
The internal controls construction of a transaction system is important to management, operation and auditing. In the environment of manual operation, the internal controls of the transaction process are all done by manual mechanism. However, after the ...
Comments