This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Thinking Operationally
May/June 2010 (vol. 8 no. 3)
pp. 54-55
Bruce Potter, Shmoo Group
To deal with targeted, coordinated, and sophisticated attacks on computing systems, security practitioners will need to move beyond the "security throughout the lifecycle" approach. They'll also need to address security concerns related to preexisting software. However, this raises a different set of difficulties.
Index Terms:
network security, firewalls, password policy, APT, advanced persistent threat, Aurora, security and privacy
Citation:
Bruce Potter, "Thinking Operationally," IEEE Security & Privacy, vol. 8, no. 3, pp. 54-55, May-June 2010, doi:10.1109/MSP.2010.109
Usage of this product signifies your acceptance of the Terms of Use.