A practical approach to enterprise IT security

被引:4
|
作者
Liu, S. [1 ]
Sullivan, J. [1 ]
Ormaner, J. [1 ]
机构
[1] National Library of Medicine, Johns Hopkins University, Baltimore, MD, United States
关键词
Computer networks - Computer system firewalls - Computer system recovery - Computer viruses - Data acquisition - Finance - Information technology - Internet - Personal computing - Scanning - Societies and institutions;
D O I
10.1109/6294.952979
中图分类号
学科分类号
摘要
A multifaceted framework to prevent, detect, and respond to ever more sophisticated threats to enterprise IT information and assets is proposed. Enterprises should adopt a similar multifaceted framework, following a practical but disciplined implementation approach.
引用
收藏
页码:35 / 42
相关论文
共 50 条
  • [41] A Security Audit Framework for Security Management in the Enterprise
    Onwubiko, Cyril
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 9 - 17
  • [42] SECURITY TESTS AND SUGGESTIONS FOR ENTERPRISE INFORMATION SECURITY
    Vural, Yilmaz
    Sagiroglu, Seref
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2011, 26 (01): : 89 - 104
  • [43] Architecting Security into the Clouds: An Enterprise Security Model
    Farroha, Bassam S.
    Farroha, Deborah L.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 553 - 559
  • [44] Security 360°: Enterprise security for the cognitive era
    Rao, J. R.
    Chari, S. N.
    Pendarakis, D.
    Sailer, R.
    Stoecklin, M. Ph.
    Teiken, W.
    Wespi, A.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (04)
  • [45] AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
    Romanov, Anton
    Okamoto, Eiji
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 313 - 318
  • [46] Practical Approach of Security Enhancement Method based on the Protection Motivation Theory
    Choi, Heeyoung
    Young, Kang Ju
    2021 21ST ACIS INTERNATIONAL WINTER CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD-WINTER 2021), 2021, : 96 - 97
  • [47] Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories
    Zbrzezny, Agnieszka M.
    Szymoniak, Sabina
    Kurkowski, Miroslaw
    LOGIC JOURNAL OF THE IGPL, 2022, 30 (02) : 289 - 300
  • [48] Enterprise information security strategies
    Anderson, Evan E.
    Choobineh, Joobin
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 22 - 29
  • [49] Enterprise security for web 2.0
    Davidson, Mary Ann
    Yoran, Elad
    COMPUTER, 2007, 40 (11) : 117 - 119
  • [50] Feeling of security in enterprise management
    Data Communications, 1996, 25 (01):