A model of security monitoring

نویسنده

  • Matt Bishop
چکیده

We present a model of security monitoring that distinguishes between two types of logging and auditing, and from the model draw implications for the design and use of security monitoring mechanisms. We then demonstrate the usefulness of the model by analyzing several different monitoring mechanisms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach

Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...

متن کامل

Location-allocation of traffic police patrols in the suburban network

Nowadays, due to population increase and expansion of the transportation networks, the monitoring of this network, control, and prevention of accidents and crimes are very important. The main tasks of traffic patrols, like other emergency-security facilities, are the monitoring and prevention of crime as well as handling and fining in the case of committing crimes. Traffic patrols should be pre...

متن کامل

MULTIOBJECTIVE OPTIMIZATION OF SENSOR PLACEMENT IN WATER DISTRIBUTION NETWORKS DUAL USE BENEFIT APPROACH

Location and types of sensors may be integrated for simultaneous achievement of water security goals and other water utility objectives, such as regulatory monitoring requirements. Complying with the recent recommendations on dual benefits of sensors, this study addresses the optimal location of these types of sensors in a multipurpose approach. The study presents two mathematical models for ...

متن کامل

Modeling of Electronic Health Management for Islamic Republic of Iran Social Security Organization

Background: Social Security Organization with more than 40 million insured people, supplies therapeutic services to nearly fifty percent of the country’s population. This volume of service needs a good update and on line planning, organizing, coordination, staffing, and budgeting. Electronic health is improving day to day and is a good tool in helping the Social Security Organization in conduct...

متن کامل

Assessment of BAM with ANP Approach; Case Study: Bank Sepah

In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989