scholarly journals Intelligent acoustic data fusion technique for information security analysis

2017 ◽  
Vol 887 ◽  
pp. 012090
Author(s):  
Ying Jiang ◽  
Yize Tang ◽  
Wenda Lu ◽  
Zhongfeng Wang ◽  
Zepeng Wang ◽  
...  
2005 ◽  
Vol 38 (9) ◽  
pp. 817-826 ◽  
Author(s):  
C. Kohl ◽  
M. Krause ◽  
C. Maierhofer ◽  
J. Wöstmann

2015 ◽  
Vol 8 (25) ◽  
Author(s):  
Joon Tae Ahn ◽  
Soonsuk Kim ◽  
Junghan Lee ◽  
Myung Gon Kim ◽  
Gil Hong Park ◽  
...  

Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


Sign in / Sign up

Export Citation Format

Share Document