Results 21 to 30 of about 2,702,156 (313)

Relations between information science and information security culture

open access: yesJournal of Modern Science, 2023
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj   +1 more source

HIERARCHICAL TEMPORAL MEMORIES IN SECURITY INFORMATION AND EVENTS MANAGEMENT SYSTEMS

open access: bronzeInternational Conference on INFORMATICS in ECONOMY Proceedings, 2020
Constanţa-Nicoleta Bodea, Mihail Cazacu
openaire   +2 more sources

Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots [PDF]

open access: yes2022 IEEE Conference on Dependable and Secure Computing (DSC), 2022
Cyber Security is a critical topic for organizations with IT/OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure.
arxiv   +1 more source

PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY

open access: yesИзмерение, мониторинг, управление, контроль, 2022
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov   +3 more
doaj   +1 more source

Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region [PDF]

open access: yesComputers & Security 92 (2020), 2020
Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that impose risks to information security properties of these assets.
arxiv   +1 more source

Classification of Modern Security Information and Event Management Systems

open access: bronzeVoprosy kiberbezopasnosti, 2018
Sergey Poljakov   +2 more
openaire   +2 more sources

Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment

open access: yesSmart Cities, 2023
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada   +3 more
doaj   +1 more source

Challenges towards Building an effective Cyber Security Operations Centre [PDF]

open access: yesInternational Journal On Cyber Situational Awareness (IJCSA), Vol. 4, No.1, 2019, ISSN: 2057-2182, https://c-mric.com/100124, 2022
The increasing dependency of modern society on IT systems and infrastructures for essential services (e.g. internet banking, vehicular network, health-IT, etc.) coupled with the growing number of cyber incidents and security vulnerabilities have made Cyber Security Operations Centre (CSOC) undoubtedly vital.
arxiv   +1 more source

Research on security risk assessment mechanism of important event based on multi-source data

open access: yesScientific Reports, 2022
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj   +1 more source

Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning

open access: yesSensors, 2023
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security.
Muhammad Arsalan Paracha   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy