Zobrazeno 1 - 10
of 258
pro vyhledávání: '"SECURITY INCIDENT"'
Publikováno v:
Indonesian Journal of Innovation and Applied Sciences, Vol 4, Iss 3, Pp 208-216 (2024)
Higher learning institutions confront heightened cyber threats due to the value of their data, necessitating a robust security culture. In addition to cyber threats, various security incidents cause danger to devices and personal belongings on campus
Externí odkaz:
https://doaj.org/article/b74d0d1687b7437d93ae646d6c213f5c
Autor:
D. A. Evdokimova, A. A. Mikryukov
Publikováno v:
Открытое образование (Москва), Vol 28, Iss 4, Pp 33-42 (2024)
The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identif
Externí odkaz:
https://doaj.org/article/d66deb3a41ed4a23ae364547a061cee6
Publikováno v:
Российский технологический журнал, Vol 12, Iss 3, Pp 25-36 (2024)
Objectives. The currently increasing number of targeted cyberattacks raises the importance of investigating information security incidents. Depending on the available means of protection, computer forensic experts use software and hardware tools for
Externí odkaz:
https://doaj.org/article/72d335766bb045e3a8f3f5cce076b2b6
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 3, Pp 16-29 (2023)
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities. The security information and even
Externí odkaz:
https://doaj.org/article/535812ef2150462684489c354589d9d2
Autor:
S.L. Zefirov, A.N. Akkuratnov
Publikováno v:
Известия высших учебных заведений. Поволжский регион:Технические науки, Iss 4 (2024)
Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of
Externí odkaz:
https://doaj.org/article/514924664dd846918a719170a4ab5581
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 3, Iss 19, Pp 176-196 (2023)
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та ко
Externí odkaz:
https://doaj.org/article/3638ad383f6c4d4c964dc672d288041f
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 397-404 (2023)
The use of blockchain technology in Decentralized Finance (DeFi) has gained popularity, with 23 public companies and one country holding bitcoin. DeFi aims to create an open and decentralized financial ecosystem that is accessible to everyone, elimin
Externí odkaz:
https://doaj.org/article/f90b9ef0c0524b6db73de764224e0c7d
Autor:
Łuczywek, Cezary
Publikováno v:
Gdańskie Studia Prawnicze / Gdańsk Legal Studies. 3(55):80-106
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1075903
Autor:
Abdulaziz Almehmadi
Publikováno v:
IEEE Access, Vol 9, Pp 24263-24272 (2021)
Individuals react in response to internal or external stimuli, whether visual, auditory, gustatory, olfactory, cutaneous, kinesthetic, or vestibular. This behavior is not fully utilized to infer possible security incidents taking place or about to ta
Externí odkaz:
https://doaj.org/article/8a8203b95ac94ca3bd7f3e520ac0d633
Autor:
Kasl, František
Publikováno v:
Časopis pro právní vědu a praxi / Journal of Jurisprudence and Legal Practice. 28(3):429-447
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=900235