Three tips for your network

被引:0
|
作者
Potter, Bruce
机构
关键词
Security systems;
D O I
10.1016/S1353-4858(09)70019-4
中图分类号
学科分类号
摘要
Often, IT security is discussed as if it exists in a vacuum. Buying security products such as firewalls and anti-virus, responding to security incidents, and the creation of security policies can seem completely disconnected from the rest of the enterprise. Security professionals deal with obscure and sometimes challenging problems that can cause them to put blinkers on and only focus on the issues directly in front of them. © 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 18
页数:2
相关论文
共 11 条
  • [1] The ultimate cybersecurity checklist for your workforce
    Forte, Dario
    Power, Richard
    Computer Fraud and Security, 2007, 2007 (09) : 14 - 19
  • [2] Human Resources: Is It a Weak Link in the Security Chain of Your Company?
    Kelly Lane
    Security Journal, 2001, 14 (4) : 7 - 16
  • [3] People Tracking in Camera Networks: Three Open Questions
    Thakoor, Ninad S.
    An, Le
    Bhanu, Bir
    Sunderrajan, Santhoshkumar
    Manjunath, B. S.
    COMPUTER, 2015, 48 (03) : 78 - 86
  • [4] Securing a Local Area Network by IDPS Open Source
    Farhaoui, Yousef
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 416 - 421
  • [5] A neural network based computer access security system for multiple users
    Anagun, AS
    Cin, I
    COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 351 - 354
  • [6] F-NIDS - A Network Intrusion Detection System based on federated learning
    de Oliveira, Jonathas A.
    Goncalves, Vinicius P.
    Meneguette, Rodolfo I.
    de Sousa Jr, Rafael T.
    Guidoni, Daniel L.
    Oliveira, Jose C. M.
    Filho, Geraldo P. Rocha
    COMPUTER NETWORKS, 2023, 236
  • [7] Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers
    Odarchenko, Roman
    Iavich, Maksim
    Iashvili, Giorgi
    Fedushko, Solomiia
    Syerov, Yuriy
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (04)
  • [8] Algorithm of network video stream recognition and classification based on multi-pattern matching
    Sun, Qin-Dong
    Guo, Xiao-Jun
    Huang, Xin-Bo
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (03): : 759 - 762
  • [9] Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging
    Chen, Wen
    Chen, Xudong
    OPTICS EXPRESS, 2011, 19 (10): : 9008 - 9019
  • [10] Online Static Security Assessment Module Using Radial Basis Neural Network Trained with Particle Swarm Optimization
    Lekshmi, M.
    Nagaraj, M. S.
    INTELLIGENT AND EFFICIENT ELECTRICAL SYSTEMS, 2018, 446 : 215 - 224