scholarly journals Real-time monitoring as a supplementary security component of vigilantism in modern network environments

Author(s):  
Victor R. Kebande ◽  
Nickson M. Karie ◽  
Richard A. Ikuesan

AbstractThe phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.

2021 ◽  
pp. 8-17
Author(s):  
Mohammed I. Alghamdi ◽  

In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.


2006 ◽  
Vol 175 (4S) ◽  
pp. 521-521
Author(s):  
Motoaki Saito ◽  
Tomoharu Kono ◽  
Yukako Kinoshita ◽  
Itaru Satoh ◽  
Keisuke Satoh

2001 ◽  
Vol 11 (PR3) ◽  
pp. Pr3-1175-Pr3-1182 ◽  
Author(s):  
M. Losurdo ◽  
A. Grimaldi ◽  
M. Giangregorio ◽  
P. Capezzuto ◽  
G. Bruno

2014 ◽  
Author(s):  
Rozaimi Ghazali ◽  
◽  
Asiah Mohd Pilus ◽  
Wan Mohd Bukhari Wan Daud ◽  
Mohd Juzaila Abd Latif ◽  
...  

Diabetes ◽  
2019 ◽  
Vol 68 (Supplement 1) ◽  
pp. 101-LB
Author(s):  
ABHINAV BHUSHAN ◽  
SONALI J. KARNIK

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 4 (4) ◽  
pp. 20
Author(s):  
KAVITHA T. ◽  
PREETHI D. LAVANYA ◽  
SARANYA S. ◽  
ANCY EVERT P.M. JONAH ◽  
◽  
...  

2010 ◽  
Vol 9 (1) ◽  
pp. 133-140
Author(s):  
Petrisor Zamora Iordache ◽  
Nicoleta Petrea ◽  
Vasile Somoghi ◽  
Mihaela Muresan ◽  
Gabriel Epure ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document