Results 21 to 30 of about 1,030,469 (325)
Improving the security level of the information system using the SSL protocol [PDF]
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga +2 more
doaj +1 more source
Seiring dengan pesatnya penggunaan teknologi informasi dan komunikasi, ancaman siber pun juga turut mengalami peningkatan. Bertolak dari beberapa permasalahan keamanan siber diperlukan suatu sistem yang dapat mengantisipasi banyaknya serangan dan atau ...
Husnul Khotimah +2 more
semanticscholar +1 more source
PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov +3 more
doaj +1 more source
Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs)
A Security Information and Event Management system (SIEM) is a tool used to collect, analyze, normalize and correlate data from various devices to identify potential cyber threats almost in real-time.
K. Bezas, Foteini Filippidou
semanticscholar +1 more source
Reactive Rules for Emergency Management [PDF]
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon +2 more
core +1 more source
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada +3 more
doaj +1 more source
XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud +2 more
core +3 more sources
Research on security risk assessment mechanism of important event based on multi-source data
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj +1 more source
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
Malware or malicious software is software or program code specifically designed to damage software on a computer or perform malicious activities. Malware is spread over the internet and includes viruses and other forms of malware.
Hendra Setiawan, Wiwin Sulistyo
semanticscholar +1 more source

