A practical approach to enterprise IT security

被引:4
|
作者
Liu, S. [1 ]
Sullivan, J. [1 ]
Ormaner, J. [1 ]
机构
[1] National Library of Medicine, Johns Hopkins University, Baltimore, MD, United States
关键词
Computer networks - Computer system firewalls - Computer system recovery - Computer viruses - Data acquisition - Finance - Information technology - Internet - Personal computing - Scanning - Societies and institutions;
D O I
10.1109/6294.952979
中图分类号
学科分类号
摘要
A multifaceted framework to prevent, detect, and respond to ever more sophisticated threats to enterprise IT information and assets is proposed. Enterprises should adopt a similar multifaceted framework, following a practical but disciplined implementation approach.
引用
收藏
页码:35 / 42
相关论文
共 50 条
  • [31] Enterprise security infrastructure
    Maley, JG
    PROCEEDINGS OF THE 5TH WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '96), 1996, : 92 - 99
  • [32] The Security Intelligent Enterprise
    Zimmermann, Doron
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2011, 24 (03) : 569 - 574
  • [33] Enterprise Level Security
    Trias, Eric D.
    Simpson, William R.
    Foltz, Kevin E.
    Konieczny, Frank P.
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 31 - 36
  • [34] ELECTRONIC DATA INTERCHANGE (EDI) SECURITY AND AUDIT - A PRACTICAL APPROACH
    EKEBRINK, I
    COMPUTER SECURITY, 1993, 37 : 267 - 275
  • [35] A Practical Approach to the Automatic Classification of Security-Relevant Commits
    Sabetta, Antonino
    Bezzi, Michele
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 579 - 582
  • [36] Workshop: Teaching Computer Security Literacy to the Masses: A Practical Approach
    Jacobson, Doug
    Rursch, Julie
    Idziorek, Joseph
    2012 FRONTIERS IN EDUCATION CONFERENCE (FIE), 2012,
  • [37] SECURITY ADMINISTRATION - A PRACTICAL SYSTEMS-APPROACH - BECKER,DC
    ROBERTS, JT
    JOURNAL OF POLICE SCIENCE AND ADMINISTRATION, 1986, 14 (03): : 264 - 264
  • [38] Usable Security of Authentication Process: New Approach and Practical Assessment
    Althobaiti, Maha M.
    Mayhew, Pam
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 179 - 180
  • [39] Practical Security
    Clark T.
    ITNOW, 2023, 65 (01) : 41
  • [40] Need Based Funding to Micro, Small and Medium Enterprise Sectors : A Practical Approach
    Patra, K. K.
    Panigrahi, C.
    PACIFIC BUSINESS REVIEW INTERNATIONAL, 2013, 5 (09): : 19 - 26