scholarly journals An Analisys of Application Logs with Splunk : Developing an App for the Synthetic Analysis of Data and Security Incidents

Author(s):  
Roberto Bruzzese
Keyword(s):  
2020 ◽  
Vol 5 ◽  
pp. 119-124
Author(s):  
A.P. Pronichev ◽  
A. A. Chechulin ◽  
L.A. Vitkova

The paper describes an approach to management of heterogeneous swarm of cyber-physical devices. This approach includes 3 functional levels: the aggregation level, the peripheral level and the data collection level. Variants of using this approach are considered: a crisis management network, a robotic complex for monitoring premises and a system for detecting security incidents in premises.


2019 ◽  
Vol 11 (7) ◽  
pp. 162 ◽  
Author(s):  
Nikolaos Serketzis ◽  
Vasilios Katos ◽  
Christos Ilioudis ◽  
Dimitrios Baltatzis ◽  
Georgios Pangalos

The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information security controls and digital forensics, as well as incident response approaches. Cyber Threat Intelligence (CTI)and forensic preparedness are the two parts of the so-called managed security services that defendants can employ to repel, mitigate or investigate security incidents. Despite their success, there is no known effort that has combined these two approaches to enhance Digital Forensic Readiness (DFR) and thus decrease the time and cost of incident response and investigation. This paper builds upon and extends a DFR model that utilises actionable CTI to improve the maturity levels of DFR. The effectiveness and applicability of this model are evaluated through a series of experiments that employ malware-related network data simulating real-world attack scenarios. To this extent, the model manages to identify the root causes of information security incidents with high accuracy (90.73%), precision (96.17%) and recall (93.61%), while managing to decrease significantly the volume of data digital forensic investigators need to examine. The contribution of this paper is twofold. First, it indicates that CTI can be employed by digital forensics processes. Second, it demonstrates and evaluates an efficient mechanism that enhances operational DFR.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 378
Author(s):  
Alberto Partida ◽  
Regino Criado ◽  
Miguel Romance

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.


2013 ◽  
Vol 95 (890) ◽  
pp. 287-307 ◽  
Author(s):  
Sorcha O'Callaghan ◽  
Leslie Leach

AbstractMany aid agencies and commentators suggest that humanitarian principles are of little value to the humanitarian crises of today. However, through profiling the experience of the Lebanese Red Cross, this article highlights the enduring value and impact of the application of the International Red Cross and Red Crescent Fundamental Principles as effective operational tools for acceptance, access and safety. Having suffered a series of security incidents during the civil war and subsequent disturbances and tensions, this National Society deliberately sought to increase its acceptance amongst different groups. One of the approaches used was the systematic operational application of the Fundamental Principles. Today, the Lebanese Red Cross is the only public service and Lebanese humanitarian actor with access throughout the country. This article seeks to address the relative absence of attention to how humanitarian organisations apply humanitarian principles in practice – and their responsibility and accountability to do so – by describing the systematic approach of the Lebanese Red Cross.


2013 ◽  
Vol 299 ◽  
pp. 130-134
Author(s):  
Li Wei ◽  
Da Zhi Deng

In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,due to the vulnerability of the computer network system inherent,a direct impact on national security and social and political stability. Because of the popularity of computers and large-scale development of the Internet, network security has been increasing as the theme. Reasonable safeguards against violations of resources; regular Internet user behavior and so on has been the public's expectations of future Internet. This paper described a stable method of getting telnet user’s account in development of network management based on telnet protocol.


2020 ◽  
Vol 13 (1) ◽  
pp. 291
Author(s):  
Masike Malatji ◽  
Annlizé L. Marnewick ◽  
Suné von Solms

The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has an overarching national cybersecurity strategy aimed at addressing cyber terrorism, cybercriminal activities, cyber vandalism, and cyber sabotage. The aim of this study is to contextualise the water and wastewater sector’s cybersecurity responsibilities within the national cybersecurity legislative and policy environment. This is achieved by conducting a detailed analysis of the international, national and sector cybersecurity stakeholders; legislation and policies; and challenges pertaining to the protection of the water and wastewater sector. The study found some concerning challenges and improvement gaps regarding the complex manner in which the national government is implementing the cybersecurity strategy. The study also found that, along with the National Cybersecurity Policy Framework (the national cybersecurity strategy of South Africa), the Electronic Communications and Transactions Act, Critical Infrastructure Protection Act, and other supporting legislation and policies make provision for the water and wastewater sector’s computer security incidents response team to be established without the need to propose any new laws or amend existing ones. This is conducive for the immediate development of the sector-specific cybersecurity governance framework and resilience strategy to protect the water and wastewater assets.


2009 ◽  
Vol 2 (1-4) ◽  
pp. 4-12 ◽  
Author(s):  
Jason K. Deane ◽  
Cliff T. Ragsdale ◽  
Terry R. Rakes ◽  
Loren Paul Rees

Sign in / Sign up

Export Citation Format

Share Document