Results 1 to 10 of about 922,242 (322)

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures [PDF]

open access: goldSensors, 2021
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo   +2 more
doaj   +10 more sources

Overview of Security Information and Event Management Systems [PDF]

open access: diamondInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +5 more sources

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: goldJ-Intech (Journal of Information and Technology), 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +3 more sources

SPEAR SIEM: A Security Information and Event Management system for the Smart Grid

open access: hybridComputer Networks, 2021
Abstract The technological leap of smart technologies has brought the conventional electrical grid in a new digital era called Smart Grid (SG), providing multiple benefits, such as two-way communication, pervasive control and self-healing. However, this new reality generates significant cybersecurity risks due to the heterogeneous and insecure nature
Panagiotis Radoglou-Grammatikis   +16 more
openalex   +4 more sources

Analysis of correlation rules in Security information and event management systems

open access: bronzeCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
This article discusses the main components of information security systems and information security incident management. The methods of non-signature, as well as signature analysis of rules and decision-making that are used in such systems are considered. The analysis of existing methods of correlation rules.
Андрій Власов, V.V. Lysko
  +9 more sources

Agentless Approach for Security Information and Event Management in Industrial IoT [PDF]

open access: goldElectronics, 2023
The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors. However, in recent years, smart infrastructure, including cyber-physical industries, has witnessed a severe disruption of operation due to privilege escalation, exploitation of misconfigurations,
Huma Zahid   +3 more
openalex   +2 more sources

Secured Access Control in Security Information and Event Management Systems

open access: goldJournal of Information Systems and Telecommunication, 2021
Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality.
Leila Rikhtechi   +2 more
openalex   +4 more sources

Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management

open access: goldIEEE Access
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality, Integrity, and Availability (CIA) of any system.
Gyana Ranjana Panigrahi   +6 more
doaj   +2 more sources

Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot [PDF]

open access: yesSensors
The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents.
Ismail   +7 more
doaj   +2 more sources

Enhancement of Internal Control by expanding Security Information Event Management System [PDF]

open access: bronzeJournal of the Korea Society of Computer and Information, 2015
Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system).
DongSung Im, Yongmin Kim
openalex   +3 more sources

Home - About - Disclaimer - Privacy