Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Communications of the ACM
Testing and evaluating computer intrusion detection systems
Communications of the ACM
Intrusion detection for distributed applications
Communications of the ACM
Communications of the ACM
The Jini architecture for network-centric computing
Communications of the ACM
Balancing cooperation and risk in intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Essentials of Management Information Systems: Organization and Technology
Essentials of Management Information Systems: Organization and Technology
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
The U.S. military's concept of a Cooperative Engagement Capability should serve as a useful referent for those attempting to design/develop large scale, organization-wide information security systems. This concept involves centralizing command over the entire suite of defensive assets (naval, air, ground) available in some region or locale; whenever a threat is directed against any US force element (a ship, an infantry unit, etc.), this central authority would then be expected to direct the deployment of whatever appears to be the most efficient countermeasure...in light of prospective as well as actual threats. This is a dramatic departure from the traditional decentralized approach, whereby each force element was expected to draw on its own defensive measures to counter any threat directed at it from any source. Industrial/commercial organizations might draw on the logic of the Cooperative Engagement Capability logic in devising a system to secure its informational assets.