42 resultados para auditing


Relevância:

10.00% 10.00%

Publicador:

Resumo:

International trade and investment economies are highly integrated and interdependent and can be exploited by organized, international terrorism. The network of inter dependencies in the international economy means that a terrorist attack has the potential to disrupt the functioning of the network, so the effects can reverberate around the world. Governments can control the distributed effects of terrorism by auditing industrial networks to reveal and protect critical hubs and by promoting flexibility in production and distribution of goods and services to improve resilience in the economy. To explain these network effects, the authors draw on the new science of complex networks which has been applied to the physical sciences and is now increasingly being used to explain organizational and economic phenomena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador: