Proceedings of the 51st Hawaii International Conference on System Sciences 2018
DOI: 10.24251/hicss.2018.597
|View full text |Cite
|
Sign up to set email alerts
|

Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks

Abstract: Within the field of information security, the identification of what we are trying to secure is essential to reducing risk. In private networks, this means understanding the classification of host end-points, identifying responsible users, and knowing the location of hosts. For the context of this paper, the authors are considering the challenges faced by higher education institutions in implementing the first Center for Internet Security (CIS) Critical Security Control: inventory of authorized and unauthorize… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The existing Internet was not designed for the applications currently developed, such as voice over IP (VoIP), Network Address Translation (NAT), and many more. It is essential to have a change in Internet architecture [9] to solve these issues. For this purpose, the research communi-ties have been proposing several architectures; however, the most dominant among them is ICN due to its versatility [10].…”
Section: Introductionmentioning
confidence: 99%
“…The existing Internet was not designed for the applications currently developed, such as voice over IP (VoIP), Network Address Translation (NAT), and many more. It is essential to have a change in Internet architecture [9] to solve these issues. For this purpose, the research communi-ties have been proposing several architectures; however, the most dominant among them is ICN due to its versatility [10].…”
Section: Introductionmentioning
confidence: 99%
“…Prior research has aimed to determine control effectiveness in specific organisational contexts [15,17,18]. Technical approaches, such as automated modelling of risk-control properties and optimisation methods, have been applied to reasoning about control effectiveness [2,3,8,9].…”
Section: Introductionmentioning
confidence: 99%