Title :
Maximizing an Organization´s Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities
Author :
Nuñez, Yonesy F.
Author_Institution :
Mercy Coll., Dobbs Ferry
Abstract :
Updating systems for security vulnerabilities has become a cumbersome yet necessary evil in today´s environment of zero-day exploits and ever-changing threat matrix. The current state of affairs for the vulnerability and threat management functions are in dire need of a solution that can rapidly assess systems for vulnerabilities and fix them expeditiously. This will guarantee the effective reconnaissance of critical vulnerabilities in a more concise and cohesive fashion throughout all industries affected by the inherent risk in systems and applications, This will also help defend against super-fast worms and other malicious mobile code that can blaze through an organization´s network leaving a path of compromised systems and reduced availability. The top-down centralized model for vulnerability assessment and remediation has proven inefficient and riddled with multiple vulnerabilities itself; the irony is befuddling. In this paper, we propose a framework to enhance an organization´s information security posture by distributedly assessing and remedying system vulnerabilities. By creating and utilizing the proposed framework, we can ensure more vigilance, a progressive and reactive implementation of a patch-management and worm defense strategy, and increased efficiency in the distribution of updates. Malicious mobile code, specifically worms, are very efficient in their distribution, this is because they are able to infect other systems in a peer-to-peer distributed fashion. By utilizing a similar approach to vulnerability assessment and patch management we can ensure a higher coverage and redundancy for all systems within and organization. The framework proposed in this paper is timely since most peer-to- peer distribution models focus more on content delivery and resource re-allocation.
Keywords :
distributed processing; security of data; content delivery; ever-changing threat matrix; information security posture; malicious mobile code; patch management; peer-to-peer distribution models; resource reallocation; security vulnerabilities; super-fast worms; threat management functions; top-down centralized model; updating systems; vulnerabilities assessing system; vulnerabilities remedying system; vulnerability assessment; worm defense strategy; zero-day exploits; Application software; Clothing industry; Collaboration; Computer hacking; Computer security; Computer worms; Information security; Peer to peer computing; Protection; Reconnaissance;
Conference_Titel :
Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference on
Conference_Location :
Sanya
Print_ISBN :
978-1-4244-1685-1
Electronic_ISBN :
978-1-4244-1686-8
DOI :
10.1109/ICNSC.2008.4525389