Getting a Handle on Security Events

نویسنده

  • Sean T Murray
چکیده

One of the many problems facing the security teams of large enterprises is the detection of security incidents. This is due mainly to the large amount of data from security devices. A new breed of software solutions, being called SIM (Security Information Management) or SEM (Security Event Management) is emerging. This paper, whiling not delving into particular vendor solutions, outlines the advantages and caveats of SIM/SEM solutions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Qualitative and Quantitative Analysis of CFTs Taking Security Causes into Account

Component fault trees that contain safety basic events as well as security basic events cannot be analyzed like normal CFTs. Safety basic events are rated with probabilities in an interval [0,1], for security basic events simpler scales such as {low, medium, high} make more sense. In this paper an approach is described how to handle a quantitative safety analysis with different rating schemes f...

متن کامل

Study of structural relationship of life stressful events and getting addicted: with the test of the moderator role of type D personality

The purpose of this study was to investigate the relationship between stressful life events and drug preparedness, by examining the role of moderating type D personality.The method of this research is a Correlation between Organizational Equation Model and the statistical population of all students of Master and Masters of Urmia University in the academic year of 1396-97(N=17000).400 students w...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Investigate the Quality of Social Security Organization Policy-Making on Social Security Pensioners Life Style Changes

This article has been done with aims to investigate impact of the quality of social security organization policy-making on pensioners' life style in that organization in the city of Mahabad and based on the criteria of environmental, Economic, Social, Political, Health, Personal security, life expectancy, housing and other services have been research case that are the most important factors tha...

متن کامل

Mastering Security Anomalies in Virtualized Computing Environments via Complex Event Processing

To protect computer systems and their users against security attacks, all potential security related incidents should be detected by monitoring system behavior. In this paper, a novel approach to detect, analyze and handle security anomalies in virtualized computing systems is presented. Adequate sensors on different virtualization layers monitor relevant events, a Complex Event Processing engi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003