A Dangerousness-Based Investigation Model for Security Event Management

Author(s):  
V. Legrand ◽  
R. State ◽  
L. Paffumi
2011 ◽  
Vol 2 (2) ◽  
pp. 67-75 ◽  
Author(s):  
Ken Lozito

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.


Author(s):  
Ken Lozito

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.


Author(s):  
A.B. Kachynskyi ◽  
◽  
M.S. Stremetska ◽  

With growing demand for the digitalization of data collection, transmission, processing and storage processes in all life spheres of individual, society, and state, there is an urgent need to construct an infrastructure of infor-mation transmission networks which can provide a secure connection between endpoints and data centers. These networks must have high availability and provide the fast and efficient processing of information requests, espe-cially in case of critical infrastructure networks. A structural functional scheme of data management for SIEM systems which includes straight and reverse relations between physical, mathematical and analytical levels is proposed, based on the stratum theory by M. Messarovich. A model of multilevel system for the data monito ring and cyber security event management is built in order to provide a systematic approach to maintain the safety state of complex systems and to ensure mechanisms for the operative real-time cyber security incident response.


Author(s):  
Vivekanand A ◽  
Trilok Singh Randhawa

Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing environment. The researcher focused on the some of the significant research issues in cloud computing typically, Security as a Service involves applications on AMAZON online shopping portal and its controlling mechanism in cloud computing environment. Outsourcing of administrative tasks, such as log management, to save time and money and allow an organization to devote more time to its core competencies. A Web interface that allows in-house administration of some tasks as well as a view of the security environment and on-going activities. The researcher proposed a model as applied to information security type services and does not require on-premises hardware, avoiding substantial capital outlays. These security services often include authentication, anti-virus, anti-malware/spyware, intrusion detection, and Penetration testing and security event management, among others.


Sign in / Sign up

Export Citation Format

Share Document