科技报告详细信息
Securing Single Points of Compromise (SPoC)
Belangia, David Warren1 
[1]Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
关键词: General & Miscellaneous(99) Compromise Security Cyber;   
DOI  :  10.2172/1188194
RP-ID  :  LA-UR--15-24805
PID  :  OSTI ID: 1188194
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】
Securing the Single Points of Compromise that provide central services to the institution???s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.
【 预 览 】
附件列表
Files Size Format View
764KB PDF download
  文献评价指标  
  下载次数:13次 浏览次数:18次