Verified Document

Patch Management Strategies Patch Management Research Paper

Related to the second point, this is a major challenge at colleges and universities with wireless and WiFi networks where hundreds of types of laptops and mobile devices are used (Higby, Bailey, 2004). The sheer variety of laptops, PCs and mobile devices make patch management in larger colleges and universities a continual and costly challenge. Cost Effective Measures for Patch Management

Spanning the spectrum from the manual to the fully automated, there are cost effective measures that organizations can take to attain a high level of effectiveness with patch management. Beginning with the most manually based approach of defining blacklists of systems that have been compromised on a network through server-based analysis (Higby, Bailey, 2004) to the use of semi-automated and automated patch management (Gerace, Cavusoglu, 2009) there is a range of cost-effect measures for managing patch distribution and validation. Blacklisting specific systems has proven to be resource intensive in academic institutions that have a very wide variety of laptops, WiFi-enabled devices, often with mixed results (Gerace, Mouton, 2004). Studies indicate that automated patch management using applications including BigFix Enterprise Suite, HFNetChk, and PatchLink Update are effective in ensuring compliance of up to 31% of all systems in a network (Brandman, 2005). Microsoft's Automatic Update (Gerace, Mouton, 2004) is a third alternative in networks that are...

Blacklisting through server-based authentication (Higby, Bailey, 2004) is not scalable over time and does not have a prescriptive approach to solving the problems of security; the approaches are only restrictive. The most cost-effective strategies for patch management combine change management programs and initiatives in conjunction with automated patch management that can scale across a wide variety of operating systems and platforms.
References

George Brandman. 2005. Patching the Enterprise. Queue 3, 2 (March 2005), 32-39.

Tom Gerace and Jean Mouton. 2004. The challenges and successes of implementing an enterprise patch management solution. In Proceedings of the 32nd annual ACM SIGUCCS conference on User services (SIGUCCS '04). ACM, New York, NY, USA, 30-33.

Thomas Gerace and Huseyin Cavusoglu. 2009. The critical elements of the patch management process. Commun. ACM 52, 8 (August 2009), 117-121.

Charles Higby and Michael Bailey. 2004. Wireless security patch management system. In Proceedings of the 5th…

Sources used in this document:
References

George Brandman. 2005. Patching the Enterprise. Queue 3, 2 (March 2005), 32-39.

Tom Gerace and Jean Mouton. 2004. The challenges and successes of implementing an enterprise patch management solution. In Proceedings of the 32nd annual ACM SIGUCCS conference on User services (SIGUCCS '04). ACM, New York, NY, USA, 30-33.

Thomas Gerace and Huseyin Cavusoglu. 2009. The critical elements of the patch management process. Commun. ACM 52, 8 (August 2009), 117-121.

Charles Higby and Michael Bailey. 2004. Wireless security patch management system. In Proceedings of the 5th conference on Information technology education (CITC5 '04). ACM, New York, NY, USA, 165-168.
Cite this Document:
Copy Bibliography Citation

Related Documents

Managing People and Organizations Business
Words: 3099 Length: 10 Document Type: Essay

To avoid all these hassles, corporates should take the lead. They should ensure that the environment is not harmed in any way and people are treated with respect and dignity without exploiting the people or the environment in any unfair way. Such initiatives get publicity too and this has a positive impact on the company's business interests. Therefore, technology has been another driving factor that induces companies to take the

Why Threat Management Is Different From Vulnerability Management
Words: 3098 Length: 10 Document Type: Term Paper

Networks Security Management Network Security Management Why Threat Management Is Different from Vulnerability Management Studies have attempted to examine on the possibility of implementing an all rounded technology that seeks to manage several layers of OSI networking levels. However, this implementation has considerably lost influence since this approach is defeated by the nature of attacks. Currently, 2600 hacking publication presents to a user several methodologies of attacks. In fact, hacking as become complex

Resource Management and Strategic Decision
Words: 1591 Length: 5 Document Type: Research Proposal

50). Therefore, the ability of planners in both civilian and military aviation settings will need to ensure this integrated approach to information management to identify opportunities for improvement and what steps will be needed today to ensure their successful outcome in the future. Conclusion The research showed that resource management and strategic decision making processes in the civilian and military sectors of the aviation industry have been profoundly affected by innovations

Pacific Garbage Patch, As IT's Often Referred
Words: 1801 Length: 6 Document Type: Essay

Pacific Garbage patch, as it's often referred to, exists between the U.S. mainland and Hawaii. Many estimates put its size at over two times larger than the state of Texas (Zhang, Zhang, Feng, and Yang, 2010). Much of this waste is composed of plastic, styrofoam, and other materials containing harmful ingredients that do not break down very quickly. In fact, much of this material ends up in the food

Marketing in Healthcare Management Over
Words: 3563 Length: 11 Document Type: Case Study

It was especially effective when evaluated for the specific demographic segmentation the organization was targeting. Young adult males were particularly inclined to watch the commercial, thanks to the buxom, bikini-clad beauty as the star. In addition, young adult females were more likely to relate to the star of commercial, more so than if they had cast a middle-aged housewife. Although these demographics were more likely to watch the commercial,

Benefits and Shortcomings of Dynamic and Fixed Patch Compliance Level...
Words: 2593 Length: 10 Document Type: Case Study

Dynamic and Fixed Patch Compliance Level The goal to achieve competitive market advantages in a business environment has made increased number of business organizations to indulge in online businesses to enhance time-to-market, increase profitability and deliver innovative products. To achieve these objectives, organizations are increasingly investing in the IT (information technology) to enhance effective communication, and transfer data across businesses through LAN (Local Area Network) and WAN (Wide Area Network).

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now