Verified Document

Security Metrics The Intent Of Case Study

Actively monitoring the percentage of XSS errors over time can determine patterns of when hackers attempt to gain access to a website's source code, database links, pricing and e-commerce systems. This is one of the most often used metrics in security dashboards used for monitoring Web-based applications and multisite installations. (%) Incidence and Trending of Buffer Overflow Injection Flaws -- This is most commonly associated with attempts to gain access to SQL databases supporting a website by forcing a buffer overflow condition (Brodkin, 2007). This is one of the most effective hacking strategies there are as it forces a system to fail and allow access.

(%) Authentication Soft and Hard Errors -- the most ubiquitous of metrics, this measures how many times passwords work or fail, and how their reset trending indicates that an automated set of code or a bot is attempting to gain literally hundreds of passwords for a system simultaneously (Brodkin, 2007).

(%) Service Level Agreement (SLA) hard security faults on system performance -- All services...

Parts of this document are hidden

View Full Document
svg-one

This metric, % of SLA hard security faults tells the percentage of time a given hard fault was encountered to the configuration management system for the website or complex or servers. A hard fault would be an attempt to either use XML or FTP to gain cross-channel access to servers and disrupt the site or bring it down. This is a technique used in more advanced Ddos attacks, which is specifically aimed at bringing down an entire site configuration.
References

Brodkin, J.. (2007, October). The top 10 reasons Web sites get hacked. Network World, 24(39), 1,16-17,20.

Su, M., Yu, G., & Lin, C.. (2009). A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. Computers & Security, 28(5), 301.

Xiong, K., & Perros, H. (2008). Trustworthy Web services provisioning for differentiated customer services.…

Sources used in this document:
References

Brodkin, J.. (2007, October). The top 10 reasons Web sites get hacked. Network World, 24(39), 1,16-17,20.

Su, M., Yu, G., & Lin, C.. (2009). A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. Computers & Security, 28(5), 301.

Xiong, K., & Perros, H. (2008). Trustworthy Web services provisioning for differentiated customer services. Telecommunication Systems, 39(3-4), 171-185.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Policy IT Security Policy
Words: 1080 Length: 4 Document Type: Term Paper

Organizational security strategies must be designed for agility and speed through the use of state-of-the-art systems that can quickly be reconfigured to match changing roles in an organization. Organizational security will be defined through role-based access, configurable through authenticated, clearly delineated processes that can be administered at the administrator level (Hone, Eloff, 2002). The organizational security strategy will also be designed on the empirically validated Confidential, Integrity and Availability (CIA)

Enterprise Security Management Security and Ethics at
Words: 1303 Length: 4 Document Type: Essay

Enterprise Security Management Security and Ethics at Cincom Systems Cincom Systems is a global leader in the development, implementation and service of enterprise software that is specifically designed for the needs of complex manufacturers. Its security and ethics policies reflect the company's long-standing customer relationships with defense contractors both in the U.S., and in the United Kingdom, France and Australia. Each of these nations use Cincom's software to manage their complex defense

Cloud Computing Information Security in
Words: 6099 Length: 18 Document Type: Research Paper

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

It Security Plan & Implementation
Words: 5733 Length: 16 Document Type: Research Proposal

Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec vs. SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec

Information Technology IT Security Implementation
Words: 3195 Length: 10 Document Type: Term Paper

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Security Program Increasing Employee Participation
Words: 607 Length: 2 Document Type: Article Review

The greater the employee ownership and vested interest in a program's success, the greater the probability of its success. This emanates from a leader's choosing to endorse and actively support an information security program and show consistency of effort and focus to attain tis objectives (Madnick, 1978). A third critical success factors is the providing of periodic feedback as to the progress of the information security program. The ability to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now