Workflow Based Security Incident Management
نویسندگان
چکیده
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incident database models have been proposed and used. The discrepancies of such databases entail that worldwide incident information is stored in different formats and places and, so, do not provide any means for Computer Security Incident Response Teams (CSIRTs) collaboration. This paper presents an architecture based on advance database techniques, able to collect incident related information from different sources. Our framework enhances the incident management process by allowing the law enforcement units to (a) collect the required evidence from incident data that are spread through a number of different incident management systems; (b) transform, clean, and homogenize them; and, finally, (c) load them to a central database management system. Such architecture can also be beneficial by minimizing the mean time between the appearance of a new incident and its publication to the worldwide community.
منابع مشابه
Design Security for Internet-Based Workflow Management Systems Adopting Security Agents
With the expansion of WFMS(workflow management systems) across the Internet, collaboration among enterprises increase. The security problems of Intranet-based WFMS, which is operated on Intranet, are critical, and the effectiveness of Internet-Based WFMSs is deeply influenced by security. For the security of Internet-Based WFMSs, this study introduces the Login Agent, the Security Agent, and Ta...
متن کاملWho Do You Call? Problem Resolution through Social Compute Units
Service process orchestration using workflow technologies have led to significant improvements in generating predicable outcomes by automating tedious manual tasks but suffer from challenges related to the flexibility required in work especially when humans are involved. Recently emerging trends in enterprises to explore social computing concepts have realized value in more agile work process o...
متن کاملIncident Command System Workflow Modeling and Analysis: A Case Study
The dynamics and volunteer-based workforce characteristics of incident command systems have raised significant challenges to workflow management systems. Incident command systems must be able to adapt to ever changing surroundings and tasks during an incident. These changes need to be known by all responsible parties, since people work in shifts, get tired or sick during the management of an in...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملCollective Problem Solving using Social Compute Units
Service process orchestration using workflow technologies has led to significant improvements in generating predicable outcomes by automating tedious manual tasks but suffer from challenges related to the flexibility required in work especially when humans are involved. Recently emerging trends in enterprises to explore social computing concepts have realized value in more agile work process or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005