Results 21 to 30 of about 1,030,469 (325)

Improving the security level of the information system using the SSL protocol [PDF]

open access: yesE3S Web of Conferences, 2023
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga   +2 more
doaj   +1 more source

Implementasi Security Information And Event Management (SIEM) Pada Aplikasi Sms Center Pemerintah Daerah Provinsi Nusa Tenggara Barat

open access: yesJurnal Begawe Teknologi Informasi (JBegaTI), 2022
Seiring dengan pesatnya penggunaan teknologi informasi dan komunikasi, ancaman siber pun juga turut mengalami peningkatan. Bertolak dari beberapa permasalahan keamanan siber diperlukan suatu sistem yang dapat mengantisipasi banyaknya serangan dan atau ...
Husnul Khotimah   +2 more
semanticscholar   +1 more source

PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY

open access: yesИзмерение, мониторинг, управление, контроль, 2022
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov   +3 more
doaj   +1 more source

Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs)

open access: yesIndonesian Journal of Computer Science, 2023
A Security Information and Event Management system (SIEM) is a tool used to collect, analyze, normalize and correlate data from various devices to identify potential cyber threats almost in real-time.
K. Bezas, Foteini Filippidou
semanticscholar   +1 more source

Reactive Rules for Emergency Management [PDF]

open access: yes, 2010
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon   +2 more
core   +1 more source

Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment

open access: yesSmart Cities, 2023
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada   +3 more
doaj   +1 more source

XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]

open access: yes, 2014
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud   +2 more
core   +3 more sources

Research on security risk assessment mechanism of important event based on multi-source data

open access: yesScientific Reports, 2022
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox

open access: yesInternational Journal of Engineering, Technology and Natural Sciences, 2023
Malware or malicious software is software or program code specifically designed to damage software on a computer or perform malicious activities. Malware is spread over the internet and includes viruses and other forms of malware.
Hendra Setiawan, Wiwin Sulistyo
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy