Application of security information and event management technology for information security in critical infrastructures

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architectural Model for Information Security Analysis of Critical Information Infrastructures

Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...

متن کامل

MAnagement of Security information and events in Service InFrastructures

Activity A5 Workpackage WP5.1 Due Date M36 Submission Date 2013-09-30 Main Author(s) N. Neves (editor) (FFCUL), N. Kuntze (Fraunhofer) C. Di Sarno (CINI), V. Vianello (UPM) Contributor(s) A. Bessani (FFCUL), R. Fonseca (FFCUL), M. Garcia (FFCUL) V. Gulisano (UPM), A. Mazzeo (CINI) , N. Mazzocca (CINI) R. Jiménez Peris (UPM), R. Rieke (Fraunhofer) , P. Rodrigues (FFCUL) L. Romano (CINI), P. Veri...

متن کامل

Approach to security assessment of critical infrastructures' information systems

This article presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary syste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SPIIRAS Proceedings

سال: 2014

ISSN: 2078-9599,2078-9181

DOI: 10.15622/sp.20.2