In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee†that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network security is implemented. However, this implementation depends on the network designers at the initial stage and the network administrators in the long term. Administrator may pave the way to attacks that could take place either at once where an obvious vulnerability may exist or in several phases where it requires information gathering or scanning in order to enter into the target system. Two studies on real cases given in this paper highlights the influence of such network administrators. To preserve the confidentiality, the names of personnel or organizations are not revealed.
[1]
Hongmei Zhang,et al.
Life Cycle Pattern Study of Malicious Codes
,
2008,
Int. J. Inf. Secur. Priv..
[2]
F. Nelson Ford,et al.
Information Security Effectiveness: Conceptualization and Validation of a Theory
,
2007,
Int. J. Inf. Secur. Priv..
[3]
Robert Hauptman.
Encyclopedia of Information Ethics and Security
,
2007,
Encyclopedia of Information Ethics and Security.
[4]
Dulal C. Kar,et al.
Applied Cryptography for Security and Privacy in Wireless Sensor Networks
,
2009,
Int. J. Inf. Secur. Priv..
[5]
Hamid R. Nemati.
International Journal of Information Security and Privacy
,
2007
.