Results 31 to 40 of about 2,702,156 (313)
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Using Financial Instruments to Transfer the Information Security Risks
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event.
Pankaj Pandey, Einar Snekkenes
doaj +1 more source
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface.
S. G. Magomedov+2 more
doaj +1 more source
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban+3 more
doaj +1 more source
Attack Classification Schema for Smart City WSNs
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets,
Victor Garcia-Font+2 more
doaj +1 more source
Information Security Risk Management Model for Big Data
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj +1 more source
Secure Web-Based Student Information Management System [PDF]
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv
Information Security Synthesis in Online Universities [PDF]
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure.
arxiv +1 more source
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta+5 more
doaj +1 more source
Security audit logging in microservice-based systems: survey of architecture patterns [PDF]
Objective. Service-oriented architecture increases technical abilities for attacker to move laterally and maintain multiple pivot points inside of compromised environment. Microservice-based infrastructure brings more challenges for security architect related to internal event visibility and monitoring.
arxiv