Advanced security management

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Information Security Management Evaluation System

Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues with...

متن کامل

Security and Reliability Requirements for Advanced Security Event Management

This paper addresses security information management in complex application scenarios. Security Information and Event Management (SIEM) systems collect and examine security related events, with the goal of providing a unified view of the monitored systems’ security status. While various SIEMs are in production, there is scope to extend the capability and resilience of these systems. The use of ...

متن کامل

Advanced Event Correlation in Security Information and Event Management Systems

In this report, several open problems in current enterprise Security Information and Event Management systems, specifically with respect to their event correlation are discussed. An advanced event correlation using a special kind of soft pattern matching in conjunction with ontological background knowledge, Description Logic inference and a probabilistic post processing by Conditional Random Fi...

متن کامل

Exam Advanced Network Security∗

Please answer your questions in the order specified. Write legibly, and use proper sentences; an unreadable answer is a wrong answer. . . Answer questions concisely, but with sufficient detail and precision. Always explain your answers. Please leave space in the margin for correction marks. Use a separate piece of scratch paper for draft answers, private computations or remarks. You are not all...

متن کامل

INDECT Advanced Security Requirements

This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features for integrated technologies such as Virtual Private Networks (VPNs), Cryptographic Algorithms, Quantum Cryptography, Federated ID Management and Secure Mobile Ad-hoc networking are described together with their expec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Management

سال: 2019

ISSN: 1055-7148,1099-1190

DOI: 10.1002/nem.2070