ABSTRACT
Since the widespread outbreak of Internet worms in fall 2003, residential institutions have been scrambling to provide better security and management approaches for their residence hall networks. This study looks at some of the common and unique problems confronting residence hall network (ResNet) managers, particularly in smaller institutions, and presents potential and recommended solutions.
- Andress, M. & Thayer, R. (2005, June 27). Keeping your endpoints in line. Network World, 22 (25), 74.Google Scholar
- Bailes, J. & Templeton, G. (2004, September). Managing P2P security. Communications of the ACM, 47(9), 95. Google ScholarDigital Library
- Boyd, J. (2000, December 11). College IT managers face the music. InternetWeek, (841).Google Scholar
- Cisco Systems. (2005). Cisco Clean Access introduction. Retrieved March 3, 2005 from http://www.cisco.com/en/US/products/ps6128/Google Scholar
- Cox, K. & Gerg, C. (2004) Managing security with Snort and IDS tools. O'Reilly Media, Inc. Sebastapol, CA. Google ScholarDigital Library
- Dyck, T. (2003, March 31). When too many rights make a wrong. eWeek, 20(13), 45.Google Scholar
- Gonsalves, A. (2005). Security flaw found in Trillian IM client. InternetWeek.com. Retrieved March 25, 2005 from http://www.internetweek.com/allStories/showArticle.jhtml?articleID=159906251Google Scholar
- Honeynet Project & Research Alliance. (2005). Know your enemy: tracking botnets. Retrieved March 13, 2005 from http://www.honeynet.org/papers/bots/Google Scholar
- Luker, M. (2004, January/February). Security: progress and challenges. Educause Review, 39(1), 60.Google Scholar
- Merillat, E. (2004). Gaming in ResNet. The ResNet Symposium 2004. Multimedia archive retrieved February 26, 2005 from http://www.resnetsymposium.org/2004princeton.htmGoogle Scholar
- NetReg.org. (2003) NetReg overview. Retrieved March 20, 2005 from http://www.netreg.org/Google Scholar
- People barrier's sub-group issue paper. (2000). Electronic Commerce Conference: Defense Reform - On the Road to Excellence. Retrieved March 20, 2005 from Interoperability Clearinghouse, Federal E-Commerce Coalition Working Group Reports, DoD/FECC White Papers: http://www.ichnet.org/FECC/dod/barriers.docGoogle Scholar
- SANS Institute. (2004). The twenty most critical Internet security vulnerabilities (Updated) The experts' consensus. Retrieved March 12, 2005 from http://www.sans.org/top20/Google Scholar
- Teo, E. (2004). HoneyNet diary 03 September 2004. Retrieved March 12, 2005 from http://iwfc.security.org.sg/viewdiary.php?diary=20040903Google Scholar
- Whitehats, Inc. (2001). IDS162 "PING-NMAP-ICMP". Retrieved March 29, 2005 from http://www.whitehats.com/cgi/arachNIDS/Show?_id=ids162&view=eventGoogle Scholar
- Wilson, M & Hash, J. (No date). Information technology security awareness, training, education, and certification. Retrieved March 20, 2005 from http://www.itl.nist.gov/lab/bulletns/bltnoct03.htmGoogle Scholar
- Zone Labs LLC. (2005). Retrieved March 10, 2005 from http://www.zonelabs.com/store/content/home.jspGoogle Scholar
Index Terms
- Security in the residential network
Recommendations
Policy enforcement within emerging distributed, event-based systems
DEBS '14: Proceedings of the 8th ACM International Conference on Distributed Event-Based SystemsComputing is becoming increasingly ubiquitous. To fully realise the potential of emerging distributed systems, it must be possible to manage and bring together (coordinate) system components in various ways---perhaps for purposes and in circumstances ...
A study of network security systems
ACS'10: Proceedings of the 10th WSEAS international conference on Applied computer scienceFirewalls provide security by applying a security policy to arriving packets these policy called security rules and also firewalls can perform other functions like Gateway Antivirus, Gateway Monitor Program to monitor the traffic which pass through the ...
Security Policies and the Software Developer
A wide range of legal and regulatory issues surround Web software development, including the need to protect consumer information. A good set of security policies will limit company exposure. Understanding and implementing good policies is therefore as ...
Comments