Visible to the public Adopting Security Routines in Legacy Organizations

TitleAdopting Security Routines in Legacy Organizations
Publication TypeConference Paper
Year of Publication2016
AuthorsAzevedo, Ernani, Machado, Marcos, Melo, Rodrigo, Aschoff, Rafael, Sadok, Djamel, Carmo, Ubiratan do
Conference NameProceedings of the 2016 Workshop on Fostering Latin-American Research in Data Communication Networks
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4426-5
KeywordsAAA, Damage Assessment, Information security, legacy systems, pbm, pubcrawl, resilience
Abstract

Security is a well-known critical issue and exploitation of vulnerabilities is increasing in number, sophistication and damage. Furthermore, legacy systems tend to offer difficulty when upgrades are needed, specially when security recommendations are proposed. This paper presents a strategy for legacy systems based on three disciplines which guide the adoption of secure routines while avoid production drop. We present a prototype framework and discuss its success in providing security to the network of a power plant.

URLhttp://doi.acm.org/10.1145/2940116.2940126
DOI10.1145/2940116.2940126
Citation Keyazevedo_adopting_2016