Results 11 to 20 of about 1,030,469 (325)
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov +6 more
doaj +2 more sources
The emergence of new and more sophisticated threats in cybersecurity has necessitated the improvement of security information and event management (SIEM) systems.
Mohamad Khayat +5 more
doaj +2 more sources
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of ...
Citra Arfanudin +2 more
semanticscholar +4 more sources
A Security Information and Event Management Pattern [PDF]
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center.
Manfred Vielberth, G. Pernul
openalex +2 more sources
Adabi Raihan Muhammad +2 more
openalex +2 more sources
Adaptive Monitoring of Companies' Information Security [PDF]
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno +6 more
doaj +1 more source
The factor of the risk and risk management In information security
Risk is the consequence of events and dangers. To rephrase it, an event that will cause damage and deprivation and this happening can be described via the term of information. The word risk means foreseeable dangers or being under the threat of possible
A. N. Ibrahimova
doaj +3 more sources
Attack Modelling and Security Evaluation for Security Information and Event Management
Igor Kotenko +2 more
openalex +2 more sources
Analytical Visualization Techniques for Security Information and Event Management
Evgenia Novikova, Igor Kotenko
openalex +3 more sources
Relations between information science and information security culture
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj +1 more source

