A Non-Secure Information Systems and the Isolation Solution

In this paper, the authors define intrusion confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long.

Provided by: NORTH ATLANTIC UNIVERSITY UNION Topic: Security Date Added: Dec 2010 Format: PDF

Find By Topic