Configuration Management and Security

被引:9
|
作者
Bellovin, Steven M. [1 ]
Bush, Randy [2 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Internet Initiat Japan, Tokyo, Japan
关键词
Configuration management; security; database; compilation; Internet network devices;
D O I
10.1109/JSAC.2009.090403
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Proper configuration management is vital for host and network security. We outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs. We conclude by discussing research challenges.
引用
收藏
页码:268 / 274
页数:7
相关论文
共 50 条
  • [1] Automated Security Configuration Management
    Ehab Al-Shaer
    Charles R. Kalmanek
    Felix Wu
    [J]. Journal of Network and Systems Management, 2008, 16 : 231 - 233
  • [2] Router security configuration management
    [J]. 2000, Shanghai Comp Soc, China (26):
  • [3] Automated Security Configuration Management
    Al-Shaer, Ehab
    Kalmanek, Charles R.
    Wu, Felix
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2008, 16 (03) : 231 - 233
  • [4] Security Design for Configuration Management of Android Devices
    Kuo, Cheng-Liang
    Yang, Chung-Huang
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 249 - 254
  • [5] SecureRTU: security on RTU configuration management by Digital Signatures
    Distefano, Alessandro
    Zaretti, Luciano
    Lattuada, Giandomenico
    Zanin, Stefano
    Dealberti, Danilo
    [J]. 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), 2015, : 356 - 361
  • [6] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    [J]. International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [7] Improving the configuration management of large network security systems
    de Albuquerque, JP
    Isenberg, H
    Krumm, H
    de Geus, PL
    [J]. AMBIENT NETWORKS, 2005, 3775 : 36 - 47
  • [8] Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives
    Sun, Chia-Ming
    Wang, Yen-Yao
    Yang, Chen-Bin
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2022, 36 (01) : 181 - 199
  • [9] Information Security Assurance and the Role of Security Configuration Management from Substantive and Symbolic Perspectives
    Sun, Chia-Ming
    Wang, Yen-Yao
    Yang, Chen-Bin
    [J]. AMCIS 2020 PROCEEDINGS, 2020,
  • [10] Blockchain-Based Security Configuration Management for ICT Systems
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    [J]. ELECTRONICS, 2023, 12 (08)