tailieunhanh - Báo cáo y học: "Network security and data integrity in academia: an assessment and a proposal for large-scale archiving"

Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học Wertheim cung cấp cho các bạn kiến thức về ngành y đề tài: Network security and data integrity in academia: an assessment and a proposal for large-scale archiving. | Comment Network security and data integrity in academia an assessment and a proposal for large-scale archiving Andrew Smith Dov Greenbaum Shawn M Douglas Morrow Long and Mark Gerstein Addresses Department of Molecular Biophysics and Biochemistry Department of Computer Science Information Technology Services and Program in Computational Biology and Bioinformatics Yale University New Haven CT 06520 USA. University of California Berkeley CA 94720 USA. Correspondence Mark Gerstein. E-mail Published 30 August 2005 Genome Biology 2005 6 119 doi gb-2005-6-9-ll9 The electronic version of this article is the complete one and can be found online at http 2005 6 9 ll9 2005 BioMed Central Ltd Academic scientific research particularly in genomics is becoming increasingly dependent on computers networks and online databases. The future will see a continuing increase in the number and importance of new discoveries and insights gained via computational analyses of large datasets rather than through direct experimentation in a laboratory. Moreover integrated analysis of multiple distributed databases will become increasingly important as the number of online scientific resources continues to rise exponentially Greenbaum et al. Nat Biotechnol 2004 22 6 77i-772 the whole is definitely greater than the sum of its parts. A direct impediment to the optimal use of online databases and their interoperation is the increasing prevalence severity and toll of computer and network security incidents. The security problem is more common and invasive than commonly thought. A recent experiment http money industries technology was conducted using honeypots - computers and networks specifically set up to be attacked in order to collect information on the frequency and types of attack. In addition to validating the protection that firewalls and regular updates of operating systems can provide options which are

TỪ KHÓA LIÊN QUAN