Aquino et al., 2021 - Google Patents
Enhancing cyber security in the Philippine academe: A risk-based it project assessment approachAquino et al., 2021
View PDF- Document ID
- 10781766666208285676
- Author
- Aquino M
- Noroña M
- Publication year
- Publication venue
- Proceedings of the international conference on industrial engineering and operations management
External Links
Snippet
Cybersecurity devices such as anti-virus, intrusion detection, and prevention system, firewall, network access control, are reactive responses to cyber-attacks because it is based on the known signature. However, security analytics and security information, and event …
- 230000002708 enhancing effect 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Allodi et al. | Security events and vulnerability data for cybersecurity risk estimation | |
Vacca | Managing information security | |
Vukalović et al. | Advanced persistent threats-detection and defense | |
Arogundade | Network security concepts, dangers, and defense best practical | |
Priyadarshini | Introduction on cybersecurity | |
Aijaz et al. | Security operations center—A need for an academic environment | |
Rawal et al. | Cybersecurity and Identity Access Management | |
Adeleke | Intrusion detection: issues, problems and solutions | |
Saha et al. | Ethical hacking: redefining security in information system | |
Shravan et al. | Penetration Testing: A Review | |
Miloslavskaya et al. | Taxonomy for unsecure big data processing in security operations centers | |
Rani et al. | Cloud computing security: a taxonomy, threat detection and mitigation techniques | |
Kothamasu et al. | An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures. | |
Swanzy et al. | Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud | |
Aquino et al. | Enhancing cyber security in the Philippine academe: A risk-based it project assessment approach | |
Jouini et al. | Threats classification: state of the art | |
Rawal et al. | The basics of hacking and penetration testing | |
Huyghue | Cybersecurity, internet of things, and risk management for businesses | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Gomez et al. | Hands-on lab on smart city vulnerability exploitation | |
Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
Pandhurnekar et al. | Proposed Method for Threat Detection Using User Behavior Analysis | |
Treacy et al. | Organizational Cybersecurity Post The Pandemic: An Exploration of Remote Working Risks and Mitigation Strategies | |
Rahman et al. | Vulnerability assessments in ethical hacking | |
Sample et al. | ZTA: Never Trust, Always Verify |