Results 31 to 40 of about 2,702,156 (313)

Problems of implementing SIEM systems in the practice of managing information security of economic entities

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj   +1 more source

Using Financial Instruments to Transfer the Information Security Risks

open access: yesFuture Internet, 2016
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event.
Pankaj Pandey, Einar Snekkenes
doaj   +1 more source

Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface

open access: yesРоссийский технологический журнал, 2020
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface.
S. G. Magomedov   +2 more
doaj   +1 more source

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response

open access: yesApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +1 more source

Attack Classification Schema for Smart City WSNs

open access: yesSensors, 2017
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets,
Victor Garcia-Font   +2 more
doaj   +1 more source

Information Security Risk Management Model for Big Data

open access: yesAdvances in Multimedia, 2022
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj   +1 more source

Secure Web-Based Student Information Management System [PDF]

open access: yesarXiv, 2022
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv  

Information Security Synthesis in Online Universities [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011, 2011
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure.
arxiv   +1 more source

V-SOC4AS: A Vehicle-SOC for Improving Automotive Security

open access: yesAlgorithms, 2023
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta   +5 more
doaj   +1 more source

Security audit logging in microservice-based systems: survey of architecture patterns [PDF]

open access: yesarXiv, 2021
Objective. Service-oriented architecture increases technical abilities for attacker to move laterally and maintain multiple pivot points inside of compromised environment. Microservice-based infrastructure brings more challenges for security architect related to internal event visibility and monitoring.
arxiv  

Home - About - Disclaimer - Privacy