enterprise security
Recently Published Documents


TOTAL DOCUMENTS

259
(FIVE YEARS 57)

H-INDEX

9
(FIVE YEARS 1)

2022 ◽  
pp. 83-112
Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


2022 ◽  
pp. 441-470
Author(s):  
Manish Shukla ◽  
Harshal Tupsamudre ◽  
Sachin Lodha

As we increasingly depend on technology, cyber threats and vulnerabilities are creating trust issues for businesses and enterprises, and cybersecurity is being considered as the number one threat to the global economy over the next 5-10 years. In this chapter, the authors explain this phenomenon by first describing the changing cyber ecosystem due to extreme digitalization and then its ramifications that are plainly visible in the latest trends in cyber-attacks. In the process, they arrive at five key implications that any modern enterprise needs to be cognizant of and discuss eight emerging measures that may help address consequences of those implications substantially. It is hoped that these measures will play a critical role in making enterprise security more proactive, cognitive, automated, connected, invisible, and risk aware.


2021 ◽  
Author(s):  
Huaqun Guo ◽  
Meng Wei ◽  
Ping Huang ◽  
Eyasu Getahun Chekole

2021 ◽  
Author(s):  
Magesh Kasthuri ◽  
Hitarshi Buch ◽  
Krishna Moorthy ◽  
Vinod Panicker

Data access is inevitable in today’s world and it is prone to threat attacks and hence data security is utmost important for any enterprise to handle industrial solutions. The economics of data being used across the industries rapidly growing in current digital world so the potential data related threats is also rapidly growing. Data security is an integrated solution component for any Enterprise solution but with the growing demand on data security and potential threat handling, Data Security as a Service (DSaaS)f is a new model widely accepted in modern age architecture in Blockchain and Big Data world combining the power of cloud based security services, decentralized network in Blockchain and tamper-proof ledger management. Any Enterprise Security architecture comprises of how data is handled in a secured way and how integration between services (consumers/producers or API interaction or any middleware services) handles data between them. Hence it is inevitable to that future technology adoption should include Data Security-as-a-service for zero-trust solution design complying with compliance and security standards for industry.


2021 ◽  
Vol 25 (5) ◽  
pp. 41-49
Author(s):  
А. V. Gavrilov ◽  
V. A. Sizov ◽  
E. V. Yaroshenko

Purpose of the study. Creating an effective information security system of an enterprise is impossible without an adequate assessment of the risks to which its assets are exposed. The results of such an assessment should become the basis for making decisions in the field of information security of the enterprise. Identification of information assets and assessment of their value, determination of the level of threats to the security of assets allow planning measures to create an enterprise information security system.This paper discusses a methodology for assessing the risks of information security of an enterprise, a distinctive feature and novelty of which is the use of modern tools and methods for constructing and analyzing business processes in order to identify the information assets of an enterprise to be protected.Materials and methods. It is proposed to identify information assets based on the model of business processes of the enterprise, performed using the IDEF0 methodology. Modeling of business processes was carried out in the Business Studio environment of the “Modern Management Technologies” company.The activity of a typical IT-industry company was considered as an example for the risk analysis.Results. The methodology for assessing the risks of information security of an enterprise described in the article has been successfully tested in the educational process. Its use in conducting laboratory classes in the discipline “Designing the information security system of enterprises and organizations” for masters studying in the direction of “Information security” allowed, according to the authors of the article, to increase the effectiveness of the formation of students’ professional competencies.Conclusion. The paper proposes a methodology for assessing information security risks for objects of an enterprise’s information infrastructure, which makes it possible to identify priority areas of information security at an enterprise. As a result of the application of the technique, a loss matrix is formed, showing the problem areas in the organization of information protection, which should be given priority attention when planning information security measures. Based on the data obtained, it is possible to form an economically justified strategy and tactics for the development of an enterprise information security system.


2021 ◽  
Author(s):  
Mohamed Nabeel ◽  
Enes Altinisik ◽  
Haipei Sun ◽  
Issa Khalil ◽  
Hui (Wendy) Wang ◽  
...  
Keyword(s):  

2021 ◽  
Vol 11 (3) ◽  
pp. 226-233
Author(s):  
Amadi Chukwuemeka Augustine ◽  
Juliet Nnenna Odii ◽  
Stanley A Okolie

This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.


Sign in / Sign up

Export Citation Format

Share Document