An Analysis of Information Security Event Managers

被引:6
|
作者
Thakur, Kutub [1 ]
Kopecky, Sandra [1 ]
Nuseir, Moath [1 ]
Ali, Md Liakat [1 ]
Qiu, Meikang [1 ]
机构
[1] Pace Univ, Seidenberg Sch Comp Sci & Informat Syst, Pleasantville, NY 10570 USA
关键词
Security Information and Event Management; Cyber Security; Cyber Security Attack; Cyber Intelligence; Threat; Data analysis;
D O I
10.1109/CSCloud.2016.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user; any variation from normal of abnormal activity could indicate that a threat is imminent and that your data or infrastructure is at risk. In the last several years, there has been a disturbing trend in which attackers are innovating much faster than the defenders. There has been a commercialization of malware with attack kits available through underground forums for anyone who wants to perpetrate any variety of attacks. Large botnets are available for rent, allowing attackers to send spam or launch DDos (distributed denial-of-service) attacks. Many attackers reuse malware and command and control (C & C) and methods, adapting their products over time to keep ahead of the anti-malware industry and security professionals. This paper surveys ESMs (Enterprise Security Managers) and cyber-attack case studies.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 50 条
  • [1] The information security digital divide between information security managers and users
    Albrechtsen, Eirik
    Hovden, Jan
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 476 - 490
  • [2] Security Information and Event Management -Capabilities, Challenges and Event Analysis in the Complex IT System
    Zgela, Mario
    Penga, Ivan
    [J]. CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS (CECIIS 2019), 2019, : 259 - 266
  • [3] The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis
    Hovav, Anat
    Gray, Paul
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 893 - 912
  • [4] Understanding key skills for information security managers
    Haqaf, Husam
    Koyuncu, Murat
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 : 165 - 172
  • [5] Information managers want more and better IT security
    不详
    [J]. COMPUTERS & SECURITY, 1999, 18 (05) : 383 - 385
  • [6] Leadership of Information Security Managers on the Effectiveness of Information Systems Security Through Mediate of Organizational Culture
    Choi, Myeonggil
    Song, Jeongsuk
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 649 - 654
  • [7] Decision-Making by Effective Information Security Managers
    Pettigrew, James
    Ryan, Julie
    Salous, Kyle
    Mazzuchi, Thomas
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 465 - 472
  • [8] A Collaborative Ontology Development Tool for Information Security Managers
    Mace, John C.
    Parkin, Simon
    van Moorsel, Aad
    [J]. ACM SYMPOSIUM ON COMPUTER HUMAN INTERACTION FOR MANAGEMENT OF INFORMATION TECHNOLOGY (CHIMIT 2010), 2010,
  • [9] A Security Analysis of Password Managers on Android
    Sharma, Abhyudaya
    Mishra, Sweta
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 3 - 22
  • [10] Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
    Gonzalez-Granadillo, Gustavo
    Gonzalez-Zarzosa, Susana
    Diaz, Rodrigo
    [J]. SENSORS, 2021, 21 (14)