Data Security Threats of Log Aggregation

نویسندگان

چکیده

The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well systems perform data collection status analysis through a unified aggregation system. However, with the increasingly diverse business forms, threats confronted by are also mounting, among which leakage, tampering, loss, security vulnerabilities dominate main positions. Data leakage imposes severe challenge privacy enterprises users, tampering misleads system even adversely affects decision-making enterprises, loss devastates past impinges on operation inflict potential safety hazards accessed aggregation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Big Data LifeCycle: Threats and Security Model

Big data is an emerging term referring to the process of managing huge amount of data from different sources, such as, DBMS, log files, postings of social media. Big data (text, number, images... etc.) could be divided into different forms: structured, semi-structured, and unstructured. Big data could be further described by some attributes like velocity, volume, variety, value, and complexity....

متن کامل

Bluetooth Security Threats

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...

متن کامل

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

Aggregation of log-linear risks

In this paper we work in the framework of a k-dimensional vector of log-linear risks. Under weak conditions on the marginal tails and the dependence structure of a vector of positive risks we derive the asymptotic tail behaviour of the aggregated risk and present an application concerning log-normal risks with stochastic volatility.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SHS web of conferences

سال: 2023

ISSN: ['2261-2424', '2416-5182']

DOI: https://doi.org/10.1051/shsconf/202317001007