A model of security monitoring
نویسنده
چکیده
We present a model of security monitoring that distinguishes between two types of logging and auditing, and from the model draw implications for the design and use of security monitoring mechanisms. We then demonstrate the usefulness of the model by analyzing several different monitoring mechanisms.
منابع مشابه
Developing a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach
Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...
متن کاملLocation-allocation of traffic police patrols in the suburban network
Nowadays, due to population increase and expansion of the transportation networks, the monitoring of this network, control, and prevention of accidents and crimes are very important. The main tasks of traffic patrols, like other emergency-security facilities, are the monitoring and prevention of crime as well as handling and fining in the case of committing crimes. Traffic patrols should be pre...
متن کاملMULTIOBJECTIVE OPTIMIZATION OF SENSOR PLACEMENT IN WATER DISTRIBUTION NETWORKS DUAL USE BENEFIT APPROACH
Location and types of sensors may be integrated for simultaneous achievement of water security goals and other water utility objectives, such as regulatory monitoring requirements. Complying with the recent recommendations on dual benefits of sensors, this study addresses the optimal location of these types of sensors in a multipurpose approach. The study presents two mathematical models for ...
متن کاملModeling of Electronic Health Management for Islamic Republic of Iran Social Security Organization
Background: Social Security Organization with more than 40 million insured people, supplies therapeutic services to nearly fifty percent of the country’s population. This volume of service needs a good update and on line planning, organizing, coordination, staffing, and budgeting. Electronic health is improving day to day and is a good tool in helping the Social Security Organization in conduct...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کامل