Results 21 to 30 of about 110,735 (289)

Principles of data collection for building a secure enterprise infrastructure based on SIEM systems

open access: diamondВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj   +3 more sources

Optimization of Security Information and Event Management (SIEM) Infrastructures, and Events Correlation / Regression Analysis for Optimal Cyber Security Posture

open access: yesArchives of Advanced Engineering Science, 2023
This work integrates logical and physical security processes, and simplifies the manageability of the security infrastructure. The process increases visibility to resources, which makes it easier to prevent security incidents, and provides a platform to ...
Akhigbe-mudu Thursday Ehis
semanticscholar   +1 more source

ATM Service Quality and Customer Satisfaction: The Empirical Evidence from Commercial Banks in Cambodia’s Siem Reap Province

open access: yesEuropean Journal of Business and Management Research, 2023
This study aimed to investigate the effect of ATM service quality on customer satisfaction in Commercial Banks in Cambodia’s Siem Reap province. The target samples were drawn from four Commercial Banks in Cambodia’s Siem Reap province.
Sothan Yoeung, Sothea Hill, Poliny Ung
semanticscholar   +1 more source

ПОТЕНЦІЙНІ ВІДВОЛІКАЮЧІ АТАКИ НА ОПЕРАЦІЙНІ ЦЕНТРИ БЕЗПЕКИ ТА SIEM СИСТЕМИ

open access: yesКібербезпека: освіта, наука, техніка, 2021
В даній статі розглянуто деякі потенційні вектори атак, що можуть бути здійснені на  системи моніторингу операційних центрів безпеки (SOC), зокрема системи SIEM.
Roman Drahuntsov, Dmytro Rabchun
doaj   +1 more source

МОДЕЛЬ ІДЕНТИФІКАЦІЇ КІБЕРІНЦИДЕНТІВ SIEM-СИСТЕМОЮ ДЛЯ ЗАХИСТУ ІНФОРМАЦІЙНО-КОМУНІКАЦІЙНИХ СИСТЕМ

open access: yesКібербезпека: освіта, наука, техніка, 2023
У статті представлено модель ідентифікації кіберінцидентів SIEM-системою, які відбуваються в ході функціонування інформаційно-комунікаційних систем (ІКС).
Ігор Субач   +1 more
doaj   +1 more source

Water stress: Opportunities for supply chain research

open access: yesProduction and Operations Management, EarlyView., 2023
Abstract Driven by climate change and overuse, water stress is a worsening sustainability concern that threatens businesses and communities across the globe. Leading global organizations such as the United Nations have expressed an urgent need for sustainable water management strategies across nations and economies.
Dustin Cole   +4 more
wiley   +1 more source

Barriers and facilitators to neonatal health and care-seeking behaviours in rural Cambodia: a qualitative study

open access: yesBMJ Open, 2020
Objectives Neonatal mortality remains persistently high in low-income and middle-income countries. In Cambodia, there is a paucity of data on the perception of neonatal health and care-seeking behaviours at the community level.
Manila Prak   +6 more
doaj   +1 more source

Estudio de un sistema de seguridad de información y administración de eventos para base de datos SQL server. Caso de estudio: entidad pública

open access: yesRevista Odigos, 2023
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj   +1 more source

The Future of SIEM in a Machine Learning-Driven Cybersecurity Landscape

open access: yesTurkish Journal of Computer and Mathematics Education, 2023
As cyber threats become increasingly sophisticatedand complex, traditional Security Information and Event Management (SIEM) systems are struggling to keep up.
Srinivas Reddy Pulyala
semanticscholar   +1 more source

Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems.

open access: yesCommunication, informatization and cybersecurity systems and technologies, 2023
The article looks at the current supply of cyber defense to the databases of information and communication systems. The effectiveness of continuous visits to databases is analyzed.
I. Subach, O. Vlasenko
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy