Relations between information science and information security culture
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj +1 more source
HIERARCHICAL TEMPORAL MEMORIES IN SECURITY INFORMATION AND EVENTS MANAGEMENT SYSTEMS
Constanţa-Nicoleta Bodea, Mihail Cazacu
openaire +2 more sources
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots [PDF]
Cyber Security is a critical topic for organizations with IT/OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure.
arxiv +1 more source
PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov+3 more
doaj +1 more source
Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region [PDF]
Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that impose risks to information security properties of these assets.
arxiv +1 more source
Classification of Modern Security Information and Event Management Systems
Sergey Poljakov+2 more
openaire +2 more sources
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada+3 more
doaj +1 more source
Challenges towards Building an effective Cyber Security Operations Centre [PDF]
The increasing dependency of modern society on IT systems and infrastructures for essential services (e.g. internet banking, vehicular network, health-IT, etc.) coupled with the growing number of cyber incidents and security vulnerabilities have made Cyber Security Operations Centre (CSOC) undoubtedly vital.
arxiv +1 more source
Research on security risk assessment mechanism of important event based on multi-source data
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj +1 more source
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security.
Muhammad Arsalan Paracha+4 more
doaj +1 more source