Security

A Non-Secure Information Systems and the Isolation Solution

Free registration required

Executive Summary

In this paper, the authors define intrusion confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long.

  • Format: PDF
  • Size: 458.07 KB