Aquino et al., 2021 - Google Patents

Enhancing cyber security in the Philippine academe: A risk-based it project assessment approach

Aquino et al., 2021

View PDF
Document ID
10781766666208285676
Author
Aquino M
Noroña M
Publication year
Publication venue
Proceedings of the international conference on industrial engineering and operations management

External Links

Snippet

Cybersecurity devices such as anti-virus, intrusion detection, and prevention system, firewall, network access control, are reactive responses to cyber-attacks because it is based on the known signature. However, security analytics and security information, and event …
Continue reading at www.ieomsociety.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Allodi et al. Security events and vulnerability data for cybersecurity risk estimation
Vacca Managing information security
Vukalović et al. Advanced persistent threats-detection and defense
Arogundade Network security concepts, dangers, and defense best practical
Priyadarshini Introduction on cybersecurity
Aijaz et al. Security operations center—A need for an academic environment
Rawal et al. Cybersecurity and Identity Access Management
Adeleke Intrusion detection: issues, problems and solutions
Saha et al. Ethical hacking: redefining security in information system
Shravan et al. Penetration Testing: A Review
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
Rani et al. Cloud computing security: a taxonomy, threat detection and mitigation techniques
Kothamasu et al. An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures.
Swanzy et al. Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud
Aquino et al. Enhancing cyber security in the Philippine academe: A risk-based it project assessment approach
Jouini et al. Threats classification: state of the art
Rawal et al. The basics of hacking and penetration testing
Huyghue Cybersecurity, internet of things, and risk management for businesses
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Gomez et al. Hands-on lab on smart city vulnerability exploitation
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Pandhurnekar et al. Proposed Method for Threat Detection Using User Behavior Analysis
Treacy et al. Organizational Cybersecurity Post The Pandemic: An Exploration of Remote Working Risks and Mitigation Strategies
Rahman et al. Vulnerability assessments in ethical hacking
Sample et al. ZTA: Never Trust, Always Verify