Results 21 to 30 of about 53,613 (192)

Enhancement of Internal Control by expanding Security Information Event Management System [PDF]

open access: bronzeJournal of the Korea Society of Computer and Information, 2015
Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system).
DongSung Im, Yongmin Kim
openalex   +3 more sources

ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX

open access: hybridCyber Security dan Forensik Digital, 2019
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region.
Citra Arfanudin   +2 more
openalex   +3 more sources

Advanced Techniques for Alert Management in Security Information and Event Management Systems With Ensembled Deep Learning, Hybrid Optimization, and Multi-Feature Extraction

open access: goldIEEE Open Journal of the Communications Society
The emergence of new and more sophisticated threats in cybersecurity has necessitated the improvement of security information and event management (SIEM) systems.
Mohamad Khayat   +5 more
doaj   +2 more sources

Comparative Analysis of IBM Qradar and Wazuh for Security Information and Event Management [PDF]

open access: gold, 2023
The idea for this paper was to compare two leading SIEM tools - the commercial IBM QRadar SIEM versus Wazuh, an open-source security solution. The topic was chosen to see whether these two tools can satisfy the security requirements in a typical IT infrastructure.
Dario Suskalo   +3 more
openalex   +2 more sources

GraphBAD: A general technique for anomaly detection in security information and event management [PDF]

open access: greenConcurrency and Computation: Practice and Experience, 2018
SummaryThe reliance on expert knowledge—required for analysing security logs and performing security audits—has created an unhealthy balance, where many computer users are not able to correctly audit their security configurations and react to potential security threats. The decreasing cost of IT and the increasing use of technology in domestic life are
Simon Parkinson   +3 more
openalex   +3 more sources

Model of security information and event management system

open access: goldVestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 2020
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex   +3 more sources

Adaptive Monitoring of Companies' Information Security [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno   +6 more
doaj   +1 more source

The factor of the risk and risk management In information security

open access: yesХабаршы. Заң сериясы, 2021
Risk is the consequence of events and dangers. To rephrase it, an event that will cause damage and deprivation and this happening can be described via the term of information. The word risk means foreseeable dangers or being under the threat of possible
A. N. Ibrahimova
doaj   +3 more sources

Improving the security level of the information system using the SSL protocol [PDF]

open access: yesE3S Web of Conferences, 2023
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy