security analyst
Recently Published Documents


TOTAL DOCUMENTS

66
(FIVE YEARS 2)

H-INDEX

13
(FIVE YEARS 0)

2021 ◽  
Vol 16 (1) ◽  
pp. 158-165
Author(s):  
Surina Nayan ◽  
Latisha Asmaak Shafie ◽  
Majdah Chulan ◽  
Fazmawati Zakaria ◽  
Suhaimi Nayan

This is a conceptual paper on virtual entrepreneurship that can be ventured by graduates in Malaysia in the IR 4.0 era.  The study defines what virtual entrepreneurship is, its advantages, reviews of some literature on the topic, IR 4.0 and its effects to Malaysian businesses in general.  Besides, the paper also focuses on types of virtual entrepreneurship that Malaysian graduates can explore.  They can venture into cyber-security analyst positions, can produce and innovate IoT tools and solutions, be online retail consigners, can be content creators for Instagram, Twitter and Facebook for companies that need their services, can do freelance copywriting and editing for new companies or traditional companies, can become social media influencers, can become YouTube personalities, can assume the role of digital strategy experts and they can also offer digitalized services and solutions. As a result, they will not depend a lot on working with the government or private sector.  It is a well-known fact that getting a job in an office is difficult nowadays. They can find their own income to continue supporting their lives in today’s challenging world when they are aware of the opportunities offered to them using the virtual world. They can actually venture into areas that do not require them to commute to their offices every day.  Instead, they can just work in front of their laptop or pc or tab which is connected to the internet. Furthermore, they themselves can create other job opportunities for others.



2021 ◽  
pp. 2-15
Author(s):  
Igor Kotenko ◽  
◽  
Maxim Kolomeec ◽  
Kseniia Zhernova ◽  
Andrey Chechulin ◽  
...  

The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.



Author(s):  
Jeremy Smith ◽  
Stephen Barker

The outcomes of military campaigns depend to a large extent on the support of local and other wider population groups, so it is important to understand their perceptions. Here we briefly describe the approach used to represent support for organizations and factions in a professional wargame designed to represent military campaigns. This specific approach was developed originally using a simple marker track system that used a basic quantified set of relationships between military campaign effects and changes to the track levels. This marker track system was developed for military campaign wargames in the UK as a means to portray support or dissent in population groups relevant to the operations, but there was originally no mechanism to drive changes other than by expert judgment. Our improved approach continues the use of marker tracks but attempts to develop a more defensible method based on Maslow’s hierarchy of needs for linking events to changes and levels on the tracks. We conducted experiments to quantify the relative importance of each element in Maslow’s hierarchy. We then continued by conducting a further experiment to identify the impact of a set of effects seen in a wargame against the Maslow elements. This has led to a set of quantified scores that may be used to drive the modifications to the marker tracks when wargame events occur. These scores are based on our initial experiments and may be updated for a specific application, perhaps for a specific setting or location in the world. The revised or enhanced approach aims to produce a transparent solution that can be understood by a military or security analyst, thus facilitating refinement, updating, and change.



Significance He has moved to roll back some of their penetration of state structures and revenue streams. However, they are striking back, with ongoing rocket attacks targeting US interests and probable responsibility for the assassination of a prominent security analyst. Impacts As cyber and covert tensions escalate between Israel and Iran, Tehran could use Iraqi militias as a tool to strike back. If US-led coalition troops were to withdraw under pressure, that would in turn undermine the residual US military presence in Syria. Austerity measures and power cuts could bring renewed mass protests, again shifting political incentives. An early election scenario would intensify political focus on flaws in the new electoral law.



2019 ◽  
Vol 8 (2S11) ◽  
pp. 3930-3933

The field of security Visualisation is an interesting and tough field of research. Enormous amount of (big) data is involved in the networking of devices. In order to analyse and get data for solving the problem, visualisation can be very helpful. Combination of security world as well as the network world is discussed in this paper. Identifying various visualisation techniques for security log data and executing workflow based composition of multiple analytic components will be identified. Interactive modes of the techniques will be discussed. Making the security files to be readable and the format for analysing are identified. More network visualisation tool allows the security analysts to quickly examine the large amount of information by rendering a millions of events and log entries in a single graphical view. Extracting files from full packet captures can save security analyst a great deal of time. There are tools available for capturing PCAP(Packet Capture) files. This PCAP files will be analysed for further details. In the proposed solution, the PCAP files will be generated with the help of Wireshark and it will be processed with the help of Apache drill for converting it into a readable format and the Visualisation can be done with R Studio. Various Visualisation tools in R will be used to visualise the PCAP files. This in order will thoroughly give some insight on the log files for any detection and prediction of malicious data.



Author(s):  
Darshana M. Baruah

Darshana Baruah, an emerging Indian maritime security analyst, examines India’s heightened focus on improving maritime domain awareness in the coastal domain, EEZ and far seas. This is increasingly being driven by growing naval presence in the Indian Ocean. Of particular concern is India’s ability to monitor the passage of PLA Navy submarine passages to Pakistan and elsewhere in the Indian Ocean. Despite improved maritime situational awareness in coastal waters, India still has difficulty in tracking surface and subsurface vessels transiting its EEZ or neighbouring waters. This will likely require coordination and collaboration with friendly states. Baruah concludes that despite India’s traditional attachment to strategic autonomy, the difficulties in any one country developing maritime domain awareness across the Indian Ocean will be a key driver in greater defence cooperation with the United States and its allies.





Sign in / Sign up

Export Citation Format

Share Document