Business process security -: Managing the new security challenge with X-Tra secure

被引:0
|
作者
Wattel, B [1 ]
机构
[1] ThunderStore BV, Shertogenbosch, Netherlands
关键词
business process security; X-Tra Secure; security policy; monitoring; privileges;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of security is destined to fail if it does not protect the process of business. Despite a record investment in security by corporations around the globe, the frequency, variety and financial cost of attacks continues to rise. And while most organizations focus their defenses on external threats from hackers and virus authors, the real security challenge is much closer to home. If security professionals want to avoid falling into the trap of trying to protect everything all the time, they need to refocus their defenses on authorized users and the resources they have access to.
引用
收藏
页码:177 / 186
页数:10
相关论文
共 50 条
  • [1] BYOD Security: A New Business Challenge
    Downer, Kathleen
    Bhattacharya, Maumita
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1128 - 1133
  • [2] Enhancing secure business process design with security process patterns
    Nikolaos Argyropoulos
    Haralambos Mouratidis
    Andrew Fish
    [J]. Software and Systems Modeling, 2020, 19 : 555 - 577
  • [3] Enhancing secure business process design with security process patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. SOFTWARE AND SYSTEMS MODELING, 2020, 19 (03): : 555 - 577
  • [4] Supporting Secure Business Process Design via Security Process Patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017, 2017, 287 : 19 - 33
  • [5] Business-driven application security: From modeling to managing secure applications
    Nagaratnam, N
    Nadalin, A
    Hondo, M
    McIntosh, M
    Austel, P
    [J]. IBM SYSTEMS JOURNAL, 2005, 44 (04) : 847 - 867
  • [6] A Voucher-Based Security Middleware for Secure Business Process Outsourcing
    Beni, Emad Heydari
    Lagaisse, Bert
    Zhang, Ren
    De Cock, Danny
    Beato, Filipe
    Joosen, Wouter
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 19 - 35
  • [7] Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure
    Anderson, John A.
    Rachamadugu, Vijay
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 351 - 358
  • [8] From Secure Business Process Modeling to Design-Level Security Verification
    Ramadan, Qusai
    Salnitri, Mattia
    Strueber, Daniel
    Juerjens, Jan
    Giorgini, Paolo
    [J]. 2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 123 - 133
  • [9] Security in business process management
    Sicherheit in Geschäftsprozessmanagement
    [J]. Accorsi, Rafael (raccorsi@acm.org), 2013, De Gruyter Oldenbourg (55):
  • [10] Security in business process engineering
    Backes, M
    Pfitzmann, B
    Waidner, M
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2003, 2678 : 168 - 183