A practical approach to enterprise IT security

被引:4
|
作者
Liu, S. [1 ]
Sullivan, J. [1 ]
Ormaner, J. [1 ]
机构
[1] National Library of Medicine, Johns Hopkins University, Baltimore, MD, United States
关键词
Computer networks - Computer system firewalls - Computer system recovery - Computer viruses - Data acquisition - Finance - Information technology - Internet - Personal computing - Scanning - Societies and institutions;
D O I
10.1109/6294.952979
中图分类号
学科分类号
摘要
A multifaceted framework to prevent, detect, and respond to ever more sophisticated threats to enterprise IT information and assets is proposed. Enterprises should adopt a similar multifaceted framework, following a practical but disciplined implementation approach.
引用
收藏
页码:35 / 42
相关论文
共 50 条
  • [21] Identity mapping -: An approach to unravel enterprise security management policies
    Essmayr, W
    Weippl, E
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 79 - 88
  • [22] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [23] Subsidiarity Approach to Food Security: Practical Models and Applications
    Masek, Vojtech
    LOGOS-VILNIUS, 2024, (120):
  • [24] A Practical Approach for Enhancing Security in Mobile RFID Environment
    Sandhya, M.
    Rangaswamy, T. R.
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 85 - 90
  • [25] A comprehensive and practical approach for power system security assessment
    Zhou, J
    Zhang, YW
    Chen, F
    POWERCON 2002: INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY, VOLS 1-4, PROCEEDINGS, 2002, : 2336 - 2339
  • [26] A Practical, Provably Unbreakable Approach to Physical Layer Security
    Khandani, Amir K.
    Bateni, E.
    2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [27] Approach to estimation of level of information security at enterprise based on genetic algorithm
    Stepanov, L., V
    Parinov, A., V
    Korotkikh, L. P.
    Koltsov, A. S.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [28] A Graph-Based Approach for Managing Enterprise Information System Security
    Sengupta, Anirban
    Manna, Asmita
    Mazumdar, Chandan
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 137 - +
  • [29] Security and the enterprise network
    Banes, David
    International Journal of Network Management, 1995, 5 (04) : 198 - 206
  • [30] Logging security on the enterprise
    不详
    EXPERT SYSTEMS, 1998, 15 (03) : 218 - 218