Next generation DDoS Web based attacks
Information assurance requires more than just "best practices in security" in essence, "essential security practices" is imperative for implementing security controls which are costly to acquire, implement and maintain; and costs in the limitations placed on an organization or bu...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Information assurance requires more than just "best practices in security" in essence, "essential security practices" is imperative for implementing security controls which are costly to acquire, implement and maintain; and costs in the limitations placed on an organization or business. These same controls imposes infringements on users as well. Many security programs create excessive costs or limitations that create severe conflicts with the core business or enterprise. This can happen by spreading security resources too thinly across too many unimportant vulnerabilities, imposing excessive controls where not required, or failing to effectively mitigate meaningful risks. We only suggest to the reader the evolution of intrusions and in particular, theft, fraud and denial of services (DoS). Distributed denial of services (DDoS) involves multiple "innocent accomplices". |
---|---|
DOI: | 10.1109/SMCSIA.2003.1232423 |