Results 21 to 30 of about 53,613 (192)
Enhancement of Internal Control by expanding Security Information Event Management System [PDF]
Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system).
DongSung Im, Yongmin Kim
openalex +3 more sources
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region.
Citra Arfanudin +2 more
openalex +3 more sources
The emergence of new and more sophisticated threats in cybersecurity has necessitated the improvement of security information and event management (SIEM) systems.
Mohamad Khayat +5 more
doaj +2 more sources
Comparative Analysis of IBM Qradar and Wazuh for Security Information and Event Management [PDF]
The idea for this paper was to compare two leading SIEM tools - the commercial IBM QRadar SIEM versus Wazuh, an open-source security solution. The topic was chosen to see whether these two tools can satisfy the security requirements in a typical IT infrastructure.
Dario Suskalo +3 more
openalex +2 more sources
GraphBAD: A general technique for anomaly detection in security information and event management [PDF]
SummaryThe reliance on expert knowledge—required for analysing security logs and performing security audits—has created an unhealthy balance, where many computer users are not able to correctly audit their security configurations and react to potential security threats. The decreasing cost of IT and the increasing use of technology in domestic life are
Simon Parkinson +3 more
openalex +3 more sources
Model of security information and event management system
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex +3 more sources
Adaptive Monitoring of Companies' Information Security [PDF]
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno +6 more
doaj +1 more source
Implementation and Management of Security Information and Event Management Tools in Information Systems Through the MSSP Model [PDF]
Predrag Škundrić +2 more
openalex +2 more sources
The factor of the risk and risk management In information security
Risk is the consequence of events and dangers. To rephrase it, an event that will cause damage and deprivation and this happening can be described via the term of information. The word risk means foreseeable dangers or being under the threat of possible
A. N. Ibrahimova
doaj +3 more sources
Improving the security level of the information system using the SSL protocol [PDF]
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga +2 more
doaj +1 more source

