منابع مشابه
Carving database storage to detect and trace security breaches
Database Management Systems (DBMS) are routinely used to store and process sensitive enterprise data. However, it is not possible to secure data by relying on the access control and security mechanisms (e.g., audit logs) of such systems alone e users may abuse their privileges (no matter whether granted or gained illegally) or circumvent security mechanisms to maliciously alter and access data....
متن کاملSanction guidelines for privacy and security breaches.
For privacy and security professionals following the news, the incidents reveal a wide span of provider philosophy and response regarding breaches. Facilities demonstrate varied degrees of access control management, differing stringency of enforcement policy, and inconsistent application of employee sanctions. Sanctions have ranged from gentle reminders to unspecified disciplinary action to ter...
متن کاملIntrusion-Detection Policies for IT Security Breaches
I systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion ...
متن کاملA Sophistication Index for Evaluating Security Breaches
The focus of this research is to develop a sophistication index for evaluating security breaches due to cyber-attacks. Although reports about cyber-attacks elucidate the sophistication involved in a given security or data breach, it is difficult to compare the sophistication of breaches across multiple attacks. Once we have an attack sophistication index, incidents can be compared and consequen...
متن کاملUsers' perceptions about mobile security breaches
Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Investigation
سال: 2017
ISSN: 1742-2876
DOI: 10.1016/j.diin.2017.06.006