scholarly journals Cyber security monitoring and data analysis at IHEP

2019 ◽  
Author(s):  
Tian Yan ◽  
Hao Hu ◽  
Dehai An ◽  
Fazhi Qi ◽  
Chen Jiang
Author(s):  
Rafid Abdulwahid Mhawi ◽  
Prof. Dr. Ali Hasson Fandi

The main objective of the research is to investigate the correlation and influence between cyber security management and the technology acceptance model in the Iraqi Ministry of Interior. The data was collected from (150) respondents represented by an intentional sample of the Directorate of Systems and Informatics and the Information Technology Department in the General Directorate of Human Resources Management and for data analysis, statistical programs (AMOS, SPSS) were employed. By adopting appropriate statistical methods, the results of the research showed that the Ministry of Interior, whenever it tries to pay attention to cyber security management, the more it is reflected in the level of technology acceptance. In other words, cyber security management has a fundamental and influential role in the extent of acceptance of the technology that will be adopted within the ministry.


Author(s):  
Manjunath Kotari ◽  
Niranjan N. Chiplunkar

Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.


Author(s):  
Keywhan Chung ◽  
Charles A. Kamhoua ◽  
Kevin A. Kwiat ◽  
Zbigniew T. Kalbarczyk ◽  
Ravishankar K. Iyer

Author(s):  
Meenakshi Bhrugubanda ◽  
A.V. L. Prasuna

Cyber security alludes to an assemblage of advancements, procedures and practices intended to forestall an assault, harm or unapproved access to systems, gadgets, projects and information. It is likewise can be alluded to as Information security. Clients must comprehend and follow the essential standards of information security, for example, email connections watchfulness, solid passwords, and information reinforcement. Today is particularly testing to implement fruitful cyber security activities since a greater number of gadgets than individuals are available and more imaginative attackers. Data science is a subset of AI, and it alludes more to the covering regions of statistics, scientific methods, and data analysis—which are all used to remove significance and bits of knowledge from information. This paper analyses the role of Data science in Cyber Security.


Sign in / Sign up

Export Citation Format

Share Document