首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Mitigating Malicious Code 减少恶意代码
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701585314
Ken Dunham, Gold Honors
ABSTRACT Mitigation of malicious code is increasingly complicated by multi-staged and mutli-variant attacks taking place daily on the Internet today. It is now common for computers to be infected for long periods of time, with malicious browser help objects, rootkits, and similar stealth codes. Identification and removal from a computer can be especially difficult. In some cases, the only reasonable effort may be to completely wipe and reinstall an image of the system, known to be free of malicious code. Manual mitigation of malicious code is a sophisticated process of threat identification, research, mitigation, and monitoring to properly remove all threat components related to an attack.
如今,互联网上每天都在发生多阶段、多变体的攻击,使得恶意代码的缓解变得越来越复杂。现在,计算机被恶意浏览器帮助对象、rootkit和类似的隐形代码感染很长一段时间是很常见的。识别和从计算机中删除可能特别困难。在某些情况下,唯一合理的努力可能是完全擦除并重新安装已知没有恶意代码的系统映像。手动缓解恶意代码是一个复杂的威胁识别、研究、缓解和监控过程,以正确删除与攻击相关的所有威胁组件。
{"title":"Mitigating Malicious Code","authors":"Ken Dunham, Gold Honors","doi":"10.1080/10658980701585314","DOIUrl":"https://doi.org/10.1080/10658980701585314","url":null,"abstract":"ABSTRACT Mitigation of malicious code is increasingly complicated by multi-staged and mutli-variant attacks taking place daily on the Internet today. It is now common for computers to be infected for long periods of time, with malicious browser help objects, rootkits, and similar stealth codes. Identification and removal from a computer can be especially difficult. In some cases, the only reasonable effort may be to completely wipe and reinstall an image of the system, known to be free of malicious code. Manual mitigation of malicious code is a sophisticated process of threat identification, research, mitigation, and monitoring to properly remove all threat components related to an attack.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79989099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing RFID Consumer Privacy and Implementation Barriers 管理RFID消费者隐私和实施障碍
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701576396
R. Goel
ABSTRACT Radio Frequency Identification (RFID) technologies have increasing visibility in the business processes: automating inventory management (supply chains), facilitating innovation, and increasing competitiveness. Since the potential applications of RFID systems are numerous, it is essential to address the industry and consumer perspective issues that have resulted in barriers to RFID implementation. This paper outlines critical barriers in implementing RFID technologies, specifically for authentication and privacy in an RFID tagged world, and provides organizational leaders with a set of initial responses, including a new scheme (Veri-RFID) for consumer privacy, that would assist in the process to overcome these challenges.
无线射频识别(RFID)技术在业务流程中越来越可见:自动化库存管理(供应链),促进创新,提高竞争力。由于RFID系统的潜在应用有很多,因此必须解决导致RFID实施障碍的行业和消费者观点问题。本文概述了实施RFID技术的关键障碍,特别是在RFID标签世界中的身份验证和隐私,并为组织领导者提供了一组初始响应,包括用于消费者隐私的新方案(Veri-RFID),这将有助于克服这些挑战。
{"title":"Managing RFID Consumer Privacy and Implementation Barriers","authors":"R. Goel","doi":"10.1080/10658980701576396","DOIUrl":"https://doi.org/10.1080/10658980701576396","url":null,"abstract":"ABSTRACT Radio Frequency Identification (RFID) technologies have increasing visibility in the business processes: automating inventory management (supply chains), facilitating innovation, and increasing competitiveness. Since the potential applications of RFID systems are numerous, it is essential to address the industry and consumer perspective issues that have resulted in barriers to RFID implementation. This paper outlines critical barriers in implementing RFID technologies, specifically for authentication and privacy in an RFID tagged world, and provides organizational leaders with a set of initial responses, including a new scheme (Veri-RFID) for consumer privacy, that would assist in the process to overcome these challenges.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10658980701576396","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72508131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Computer Hackers and Search and Seizure: United States v. Jarrett 计算机黑客和搜查和扣押:美国诉贾勒特案
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701585306
Edward H. Freeman
An overvarnish unit for a can decorator machine mounted on an adjustable frame which supports an adjustable applicator roll for applying a coating material associated with a pre-spin wheel for rotatable mandrels and also supports an adjustable coating material meter roll associated with an adjustable fountain means.
一种用于罐装饰机的涂漆单元,安装在可调节框架上,该框架支持用于施用与用于可旋转芯棒的预旋轮相关的涂层材料的可调节涂抹器辊,并且还支持与可调节喷泉装置相关的可调节涂层材料计量辊。
{"title":"Computer Hackers and Search and Seizure: United States v. Jarrett","authors":"Edward H. Freeman","doi":"10.1080/10658980701585306","DOIUrl":"https://doi.org/10.1080/10658980701585306","url":null,"abstract":"An overvarnish unit for a can decorator machine mounted on an adjustable frame which supports an adjustable applicator roll for applying a coating material associated with a pre-spin wheel for rotatable mandrels and also supports an adjustable coating material meter roll associated with an adjustable fountain means.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84560042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
You Installed Internet Security on Your Network: Is Your Company Safe? 你在你的网络上安装了互联网安全:你的公司安全吗?
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701584606
Ryan Sherstobitoff, Pedro J. Bustamante
ABSTRACT Cyber-crime and malware has evolved so drastically over the last two years that it is a challenge for an IT professional to stay on top of recent malware trends and technological advances in cyber-security. This paper provides a look from inside the antivirus laboratory at current malware attacks and technology developments for effective defenses.
在过去的两年中,网络犯罪和恶意软件的发展如此迅猛,对于it专业人员来说,在网络安全方面保持最新的恶意软件趋势和技术进步是一个挑战。本文从反病毒实验室内部介绍了当前的恶意软件攻击和有效防御的技术发展。
{"title":"You Installed Internet Security on Your Network: Is Your Company Safe?","authors":"Ryan Sherstobitoff, Pedro J. Bustamante","doi":"10.1080/10658980701584606","DOIUrl":"https://doi.org/10.1080/10658980701584606","url":null,"abstract":"ABSTRACT Cyber-crime and malware has evolved so drastically over the last two years that it is a challenge for an IT professional to stay on top of recent malware trends and technological advances in cyber-security. This paper provides a look from inside the antivirus laboratory at current malware attacks and technology developments for effective defenses.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88098124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Awareness Education as the Key to Ransomware Prevention 意识教育是防范勒索软件的关键
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701576412
X. Luo, Qinyu Liao
In the paradigm of Information Systems (IS), information security research has received increased attention from both academic researchers and industry practitioners alike. This intriguing phenomena is related to the growing recognition that, notwithstanding the advances in information technology (IT) for data collection, storage, and processing at a remarkable rate, users’ concerns over security of what is surreptitiously collected and the privacy violations resulting from their misuse of IT have also skyrocketed. Such sophisticated threats as phishing, pharming, and spyware have further exacerbated users’ worries about information confidentiality, integrity, and availability. Therefore, understanding of pertinent issues in information security vis-a-vis technical, theoretical, managerial, and regulatory aspects of information systems is becoming increasingly important to the IT community. Today’s organizations confront not only keen peer competition in business society but also increasingly sophisticated information security threats in cyber world, as online presence and business transaction are considered as a possible profit-driven avenue and a necessary means for global competence. In computer virology, as technologies continue to evolve, advanced encryption algorithms, on the positive side, can be utilized to effectively protect valuable information assets of enterprises. On the negative side, however, they can also be employed by malicious attackers to conduct pernicious activities in search of profits or benefits. Past information security research has investigated such malware programs as Trojan horse, worms, and spyware from a plethora of scientific perspectives (Warkentin, Luo, and Templeton, 2005), and relevant strategies and tactics have been proposed to alleviate and eradicate the cyber threats (Luo, 2006). Recently, the emergence of a new form of malware in cyberspace known as ransomware or cryptovirus has drawn attention among information security practitioners and researchers. Imposing serious threats to information assets protection, ransomware victimizes Internet users by hijacking user files, encrypting them, and then demanding payment in exchange for the decryption key. Seeking system vulnerabilities, ransomeware invariably tries to seize control over the victim’s files or computer until the victim agrees to the attacker’s demands, usually by transferring funds to the designated online currency accounts such as eGold or Webmoney or by purchasing Address correspondence to Xin Luo, Department of Computer Information Systems, School of Business, Virginia State University, Petersburg, Virginia, 23806. E-mail: xluo@vsu.edu Awareness Education as the Key to Ransomware Prevention
在信息系统(IS)的范式中,信息安全研究越来越受到学术研究者和行业从业者的关注。这一有趣的现象与越来越多的人认识到,尽管信息技术(IT)在数据收集、存储和处理方面以惊人的速度取得了进步,但用户对秘密收集的内容的安全性以及因滥用IT而导致的隐私侵犯的担忧也在飙升。诸如网络钓鱼、诈骗和间谍软件等复杂的威胁进一步加剧了用户对信息机密性、完整性和可用性的担忧。因此,对信息系统的技术、理论、管理和监管方面的信息安全相关问题的理解对IT界变得越来越重要。当今的组织不仅要面对商业社会中激烈的同行竞争,还要面对网络世界中日益复杂的信息安全威胁,因为在线存在和商业交易被认为是一种可能的利润驱动途径和全球竞争力的必要手段。在计算机病毒学中,随着技术的不断发展,先进的加密算法可以有效地保护企业宝贵的信息资产,这是积极的一面。然而,从消极的一面来看,它们也可以被恶意攻击者利用来进行有害的活动,以寻求利润或利益。过去的信息安全研究已经从众多的科学角度调查了特洛伊木马、蠕虫和间谍软件等恶意软件程序(Warkentin, Luo, and Templeton, 2005),并提出了相关的策略和战术来缓解和消除网络威胁(Luo, 2006)。最近,网络空间中出现了一种名为勒索软件或加密病毒的新型恶意软件,引起了信息安全从业者和研究人员的注意。勒索软件对信息资产保护构成严重威胁,它通过劫持用户文件,对其进行加密,然后要求支付赎金以换取解密密钥,从而使互联网用户受害。为了寻找系统漏洞,勒索软件总是试图控制受害者的文件或计算机,直到受害者同意攻击者的要求,通常是通过将资金转移到指定的在线货币账户,如eGold或Webmoney,或通过购买地址通信到Xin Luo,计算机信息系统系,弗吉尼亚州立大学商学院,彼得堡,弗吉尼亚州,23806。电子邮件:xluo@vsu.edu意识教育是预防勒索软件的关键
{"title":"Awareness Education as the Key to Ransomware Prevention","authors":"X. Luo, Qinyu Liao","doi":"10.1080/10658980701576412","DOIUrl":"https://doi.org/10.1080/10658980701576412","url":null,"abstract":"In the paradigm of Information Systems (IS), information security research has received increased attention from both academic researchers and industry practitioners alike. This intriguing phenomena is related to the growing recognition that, notwithstanding the advances in information technology (IT) for data collection, storage, and processing at a remarkable rate, users’ concerns over security of what is surreptitiously collected and the privacy violations resulting from their misuse of IT have also skyrocketed. Such sophisticated threats as phishing, pharming, and spyware have further exacerbated users’ worries about information confidentiality, integrity, and availability. Therefore, understanding of pertinent issues in information security vis-a-vis technical, theoretical, managerial, and regulatory aspects of information systems is becoming increasingly important to the IT community. Today’s organizations confront not only keen peer competition in business society but also increasingly sophisticated information security threats in cyber world, as online presence and business transaction are considered as a possible profit-driven avenue and a necessary means for global competence. In computer virology, as technologies continue to evolve, advanced encryption algorithms, on the positive side, can be utilized to effectively protect valuable information assets of enterprises. On the negative side, however, they can also be employed by malicious attackers to conduct pernicious activities in search of profits or benefits. Past information security research has investigated such malware programs as Trojan horse, worms, and spyware from a plethora of scientific perspectives (Warkentin, Luo, and Templeton, 2005), and relevant strategies and tactics have been proposed to alleviate and eradicate the cyber threats (Luo, 2006). Recently, the emergence of a new form of malware in cyberspace known as ransomware or cryptovirus has drawn attention among information security practitioners and researchers. Imposing serious threats to information assets protection, ransomware victimizes Internet users by hijacking user files, encrypting them, and then demanding payment in exchange for the decryption key. Seeking system vulnerabilities, ransomeware invariably tries to seize control over the victim’s files or computer until the victim agrees to the attacker’s demands, usually by transferring funds to the designated online currency accounts such as eGold or Webmoney or by purchasing Address correspondence to Xin Luo, Department of Computer Information Systems, School of Business, Virginia State University, Petersburg, Virginia, 23806. E-mail: xluo@vsu.edu Awareness Education as the Key to Ransomware Prevention","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90621330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Trends in Security Product Evaluations 安全产品评估的趋势
Q4 Social Sciences Pub Date : 2007-07-01 DOI: 10.1080/10658980701576404
Richard E. Smith
ABSTRACT Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product security. Despite high costs and disputed benefits, the number of evaluated products has grown dramatically since 2001, doubling between 2003 and 2005 and leaping again in 2006. Using details from more than 860 security evaluations, this paper looks at the types of products evaluated, the “assurance levels” achieved, where the evaluations occur, and ongoing participation by product vendors. These observations are combined with other lessons learned to make recommendations on product evaluation strategies.
政府认可的安全评估,就像那些在通用标准(CC)下执行的评估一样,使用已建立的软件质量保证技术来尝试评估产品安全性。尽管成本高,效益也有争议,但自2001年以来,接受评估的产品数量大幅增长,2003年至2005年期间翻了一番,2006年再次大幅增长。本文使用860多个安全评估的细节,研究了评估的产品类型、达到的“保证级别”、评估发生的位置以及产品供应商的持续参与。将这些观察结果与其他经验教训结合起来,就产品评价战略提出建议。
{"title":"Trends in Security Product Evaluations","authors":"Richard E. Smith","doi":"10.1080/10658980701576404","DOIUrl":"https://doi.org/10.1080/10658980701576404","url":null,"abstract":"ABSTRACT Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product security. Despite high costs and disputed benefits, the number of evaluated products has grown dramatically since 2001, doubling between 2003 and 2005 and leaping again in 2006. Using details from more than 860 security evaluations, this paper looks at the types of products evaluated, the “assurance levels” achieved, where the evaluations occur, and ongoing participation by product vendors. These observations are combined with other lessons learned to make recommendations on product evaluation strategies.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84543340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From the Editor's Desk 从编辑部
Q4 Social Sciences Pub Date : 2007-06-12 DOI: 10.1080/10658980701471572
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701471572","DOIUrl":"https://doi.org/10.1080/10658980701471572","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81466207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Email Privacy and the Wiretap Act: U.S. v. Councilman 电子邮件隐私和窃听法案:美国诉议员案
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980701225424
Edward H. Freeman
A tilting table includes a table top attached to an upper U-shaped bracket. A lower U-shaped bracket is rotatively attached by a bearing to a base. The lower U-shaped bracket includes a pair of opposed side, substantially horizontal slots and a pair of opposed side angle slots. The angle slots include a plurality of notches. Pins are slidably received in the slots, and are carried by the upper bracket for supporting the table top. The pins are selectively positioned in the notches of the angle slots, while the pins slidably move in the substantially horizontal slots for selectively inclining the table top.
一种可倾斜的桌子,包括附着在上u形支架上的桌面。一个较低的u形支架通过轴承旋转地连接到基座上。下u型支架包括一对对边、基本水平槽和一对对边角槽。所述角槽包括多个缺口。销在槽内可滑动接收,并由支撑桌面的上支架承载。所述销钉选择性地定位于所述角槽的凹槽中,所述销钉在所述基本上水平的凹槽中滑动移动,用于选择性地倾斜所述桌面。
{"title":"Email Privacy and the Wiretap Act: U.S. v. Councilman","authors":"Edward H. Freeman","doi":"10.1080/10658980701225424","DOIUrl":"https://doi.org/10.1080/10658980701225424","url":null,"abstract":"A tilting table includes a table top attached to an upper U-shaped bracket. A lower U-shaped bracket is rotatively attached by a bearing to a base. The lower U-shaped bracket includes a pair of opposed side, substantially horizontal slots and a pair of opposed side angle slots. The angle slots include a plurality of notches. Pins are slidably received in the slots, and are carried by the upper bracket for supporting the table top. The pins are selectively positioned in the notches of the angle slots, while the pins slidably move in the substantially horizontal slots for selectively inclining the table top.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86831545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rootkits and Their Effects on Information Security Rootkits及其对信息安全的影响
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980701402049
Lynn Erla Beegle
A rootkit is cloaked software that infiltrates an operating system or a database with the intention to escape detection, resist removal, and perform a specific operation. Many rootkits are designed to invade the “root,” or kernel, of the program, and therefore operate without announcing their presence to the owner of the computer. Although some rootkits are written with noble intentions (e.g., to strengthen an anti-virus package), true rootkits have a malicious purpose. A rootkit infection can render a compromised computer system vulnerable to attacks and corruption. Rootkits are named for their origin in Linux systems, but the number of rootkits that attack Microsoft operating systems has recently proliferated. Not only are rootkits difficult to detect and assess, but at times the only effective way to remove them is to do a clean installation of the entire operating system. Recent discoveries of rootkits in other venues prove that the problem is spreading and is a major concern for administrators in information security. This paper presents a brief history of the development of rootkits and their possible effects.Prominent cases involving rootkits are described.The paper concludes with an overview of methods to prevent rootkits and to (hopefully) eradicate one that has infected an operating system.
rootkit是一种隐蔽的软件,它渗透到操作系统或数据库中,目的是逃避检测,抵抗移除,并执行特定操作。许多rootkit被设计为入侵程序的“根”或内核,因此在不向计算机所有者宣布其存在的情况下运行。尽管一些rootkit是出于高尚的目的而编写的(例如,加强反病毒包),但真正的rootkit具有恶意目的。rootkit感染可以使受损的计算机系统容易受到攻击和破坏。rootkit因其在Linux系统中的起源而得名,但攻击微软操作系统的rootkit数量最近激增。rootkit不仅难以检测和评估,而且有时删除它们的唯一有效方法是重新安装整个操作系统。最近在其他场所发现的rootkit证明,这个问题正在蔓延,并且是信息安全管理员的主要关注点。本文简要介绍了rootkit的发展历史及其可能产生的影响。描述了涉及rootkit的突出案例。本文最后概述了防止rootkit的方法,并(希望)根除已感染操作系统的rootkit。
{"title":"Rootkits and Their Effects on Information Security","authors":"Lynn Erla Beegle","doi":"10.1080/10658980701402049","DOIUrl":"https://doi.org/10.1080/10658980701402049","url":null,"abstract":"A rootkit is cloaked software that infiltrates an operating system or a database with the intention to escape detection, resist removal, and perform a specific operation. Many rootkits are designed to invade the “root,” or kernel, of the program, and therefore operate without announcing their presence to the owner of the computer. Although some rootkits are written with noble intentions (e.g., to strengthen an anti-virus package), true rootkits have a malicious purpose. A rootkit infection can render a compromised computer system vulnerable to attacks and corruption. Rootkits are named for their origin in Linux systems, but the number of rootkits that attack Microsoft operating systems has recently proliferated. Not only are rootkits difficult to detect and assess, but at times the only effective way to remove them is to do a clean installation of the entire operating system. Recent discoveries of rootkits in other venues prove that the problem is spreading and is a major concern for administrators in information security. This paper presents a brief history of the development of rootkits and their possible effects.Prominent cases involving rootkits are described.The paper concludes with an overview of methods to prevent rootkits and to (hopefully) eradicate one that has infected an operating system.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76465307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security for Enterprise Resource Planning Systems 企业资源规划系统的安全性
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980701401959
Wei She, B. Thuraisingham
Enterprise Resource Planning (ERP) is the technology that provides the unified business function to the organization by integrating the core processes. ERP now is experiencing the transformation that will make it highly integrated, more intelligent, more collaborative, web-enabled, and even wireless. The ERP system is becoming the system with high vulnerability and high confidentiality in which the security is critical for it to operate. Many ERP vendors have already integrated their security solution, which may work well internally; while in an open environment, we need new technical approaches to secure an ERP system. This paper introduces ERP technology from its evolution through architecture to its products. The security solution in ERP as well as directions for secure ERP systems is presented.
企业资源规划(Enterprise Resource Planning, ERP)是一种通过集成核心流程为组织提供统一业务功能的技术。ERP正在经历一场变革,它将使其高度集成、更智能、更协作、支持网络,甚至是无线化。ERP系统正在成为高脆弱性、高保密性的系统,其安全性对ERP系统的运行至关重要。许多ERP供应商已经集成了他们的安全解决方案,这些解决方案可能在内部运行良好;而在开放环境下,我们需要新的技术手段来保障ERP系统的安全。本文介绍了ERP技术从体系结构到产品的演变过程。提出了ERP系统的安全解决方案以及ERP系统安全的发展方向。
{"title":"Security for Enterprise Resource Planning Systems","authors":"Wei She, B. Thuraisingham","doi":"10.1080/10658980701401959","DOIUrl":"https://doi.org/10.1080/10658980701401959","url":null,"abstract":"Enterprise Resource Planning (ERP) is the technology that provides the unified business function to the organization by integrating the core processes. ERP now is experiencing the transformation that will make it highly integrated, more intelligent, more collaborative, web-enabled, and even wireless. The ERP system is becoming the system with high vulnerability and high confidentiality in which the security is critical for it to operate. Many ERP vendors have already integrated their security solution, which may work well internally; while in an open environment, we need new technical approaches to secure an ERP system. This paper introduces ERP technology from its evolution through architecture to its products. The security solution in ERP as well as directions for secure ERP systems is presented.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81452256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1