The Need for Application Control
The wide adoption of social media and Web 2.0 applications changes the way people use the Internet. More than ever, businesses struggle to keep up with security challenges. The use of internet applications comes with problems that administrators must know about:
UserCheck CLI Malware threats - Application use can open networks to threats from malware. Popular applications like Twitter, Facebook, and YouTube can cause users to download viruses unintentionally. File sharing can easily cause malware to be downloaded into your network.
A recent report by Drexel University [Eisenstein et al., 2003b] addresses the complex
issue of life safety systems tied into the BCS—a scenario that does not fit well with the
scenarios presented above. Presently all life safety systems (fire) are in parallel to the
HVAC and other elements of the BCS, with separate wiring and only connections at the
highest controller level to allow the BCS to get status information.
Impersonation is closely related to unauthorized access but is signiﬁcant enough to be
discussed separately. Impersonation is the ability to present credentials as if you are
something or someone you are not. These attacks can take several forms: stealing a private
key or recording an authorization sequence to replay at a later time. These attacks are
commonly referred to as man-in-the-middle attacks, where an intruder is able to intercept
trafﬁc and can as a result hijack an existing session, alter the transmitted data, or inject
bogus trafﬁc into the network.
The widespread use of credit scores to underwrite and price automobile and
homeowners insurance has generated considerable concern that the practice may
significantly restrict the availability of affordable insurance products to minority and low-
income consumers. However, no existing studies have effectively examined whether credit
scores have a disproportionate negative impact on minorities or other demographic groups,
primarily because of the lack of public access to appropriate data.