Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inVillano, Matt
TitelStand & Deliver
QuelleIn: Campus Technology, 20 (2006) 2, S.32-34 (6 Seiten)
PDF als Volltext Verfügbarkeit 
Spracheenglisch
Dokumenttypgedruckt; online; Zeitschriftenaufsatz
ISSN1553-7544
SchlagwörterHigher Education; Campuses; Computer Security; Human Factors Engineering; Performance Technology; Technology Uses in Education; Barriers; Performance Factors; Information Networks; Computer Networks; Information Transfer; Information Policy; Information Technology
AbstractOctober is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as top concerns; viruses and e-mail worms are at an all-time high; and other affronts to the network are occurring with greater and greater frequency. Even hackers are getting in on the act: A recent "USA Today" review of 109 computer-related security breaches reported by 76 college campuses since January 2005 found that 70 percent involved hacking of one form or another. Faced with this multitude of threats, security administrators across higher education are fighting back on four major fronts: (1) the perimeter; (2) inside the network (internal); (3) e-mail; and (4) the administrative level. While "perimeter" defenses revolve around next-generation firewalls, "internal" network strategies focus on something called "cooperative enforcement" to make sure endpoints are secure. "E-mail" security is its own beast altogether, and at the "administrative" level, security experts are implementing a mix of penetration-testing and security-event-management tools to identify and repair security problems proactively. These are groundbreaking security strategies that work. The author suggests that it is time to drop the ad hoc approach, take a stand, and strengthen those network defenses with products and approaches that deliver. In this article, campus technologists discuss security measures that are working now. (ERIC).
Anmerkungen1105 Media, Inc. 9121 Oakdale Avenue Suite 101, Chatsworth, CA 91311; Tel: 818-734-1520; Fax: 818-734-1522; Web site: http://campustechnology.com/home.aspx
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2017/4/10
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste
Bibliotheken, die die Zeitschrift "Campus Technology" besitzen:
Link zur Zeitschriftendatenbank (ZDB)

Artikellieferdienst der deutschen Bibliotheken (subito):
Übernahme der Daten in das subito-Bestellformular

Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: