Continuous process improvement and the risk to information assurance
In today's climate, every good manager should pay attention to the technology gap developing between the deployment of information assurance (IA) products and the technical capabilities of exploiters who can successfully attack an enterprise's information assets. The growing number of woul...
Gespeichert in:
Veröffentlicht in: | IEEE software 2002-01, Vol.19 (1), p.84-86 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In today's climate, every good manager should pay attention to the technology gap developing between the deployment of information assurance (IA) products and the technical capabilities of exploiters who can successfully attack an enterprise's information assets. The growing number of would-be hackers eager to infiltrate a network-based computer system represents an ever-present threat to managers concerned with protecting the information assets those same computer systems host. Managers can counter this threat by acquiring and deploying protection technology within an environment that involves, at best, an incremental improvement process. However; the exploiter of the computer-based system works within a continuous process improvement environment. The difference between the exploiter's and the manager's environments creates an IA gap that leaves information assets vulnerable and therefore at risk. |
---|---|
ISSN: | 0740-7459 1937-4194 |
DOI: | 10.1109/52.976945 |