scholarly journals Towards Cloud Security Monitoring: A Case Study

Author(s):  
Umar Mukhtar Ismail ◽  
Syed Islam ◽  
Shareeful Islam
Risks ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 10
Author(s):  
Valentina Kravchenko ◽  
Tatiana Kudryavtseva ◽  
Yuriy Kuporov

The issue of economic security is becoming an increasingly urgent one. The purpose of this article is to develop a method for assessing threats to the economic security of the Russian region. This method is based on step-by-step actions: first of all, choosing an element of the region’s economic security system and collecting its descriptive indicators; then grouping indicators by admittance-process-result categories and building hypotheses about their influence; testing hypotheses using a statistical package and choosing the most significant connections, which can pose a threat to the economic security of the region; thereafter ranking regions by the level of threats and developing further recommendations. The importance of this method is that with the help of grouping regions (territory of a country) based on proposed method, it is possible to develop individual economic security monitoring tools. As a result, the efficiency of that country’s region can be higher. In this work, the proposed method was tested in the framework of public procurement in Russia. A total of 14 indicators of procurement activity were collected for each region of the Russian Federation for the period from 2014 to 2018. Regression models were built on the basis of the grouped indicators. Ordinary Least Squares (OLS) Estimation was used. As a result of pairwise regression models analysis, we have defined four significant relationships between public procurement indicators. There are positive connections between contracts that require collateral and the percentage of tolerances, between the number of bidders and the number of regular suppliers, between the number of bidders and the average price drop, and between the number of purchases made from a single supplier and the number of contracts concluded without reduction. It was determined that the greatest risks for the system were associated with the connection between competition and budget savings. It was proposed to rank analyzed regions into four groups: ineffective government procurement, effective government procurement, and government procurement that threatens the system of economic security of the region, that is, high competition with low savings and low competition with high savings. Based on these groups, individual economic security monitoring tools can be developed for each region.


Author(s):  
Teemu Kanstren ◽  
Sami Lehtonen ◽  
Reijo Savola ◽  
Hilkka Kukkohovi ◽  
Kimmo Hatonen

Symmetry ◽  
2020 ◽  
Vol 12 (2) ◽  
pp. 307 ◽  
Author(s):  
Ngo Tung Son ◽  
Bui Ngoc Anh ◽  
Tran Quy Ban ◽  
Le Phuong Chi ◽  
Bui Dinh Chien ◽  
...  

Face recognition (FR) has received considerable attention in the field of security, especially in the use of closed-circuit television (CCTV) cameras in security monitoring. Although significant advances in the field of computer vision are made, advanced face recognition systems provide satisfactory performance only in controlled conditions. They deteriorate significantly in the face of real-world scenarios such as lighting conditions, motion blur, camera resolution, etc. This article shows how we design, implement, and conduct the empirical comparisons of machine learning open libraries in building attendance taking (AT) support systems using indoor security cameras called ATSS. Our trial system was deployed to record the appearances of 120 students in five classes who study on the third floor of FPT Polytechnic College building. Our design allows for flexible system scaling, and it is not only usable for a school but a generic attendance system with CCTV. The measurement results show that the accuracy is suitable for many different environments.


2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Zhengyu Xie ◽  
Yong Qin

We consider the sensor networks hierarchical optimization problem in high-speed railway transport hub (HRTH). The sensor networks are optimized from three hierarchies which are key area sensors optimization, passenger line sensors optimization, and whole area sensors optimization. Case study on a specific HRTH in China showed that the hierarchical optimization method is effective to optimize the sensor networks for security monitoring in HRTH.


2019 ◽  
Vol 28 (3) ◽  
pp. 321-345 ◽  
Author(s):  
Opeoluwa Ore Akinsanya ◽  
Maria Papadaki ◽  
Lingfen Sun

Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature. Findings The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security. Research limitations/implications Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies. Practical implications The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes. Originality/value The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.


Sign in / Sign up

Export Citation Format

Share Document