A Security Incident Sharing and Classification System for Building Trust in Cross Media Enterprises
نویسندگان
چکیده
Trust in cross-media applications is essential to successful collaboration. Cross media service delivery encompasses different types of security incidents and assumes a level of trust on the part of the participants of any one transaction. As enterprises and participants of cross media transactions become more susceptible to security risks facilitated by the heterogeneity of data being exchanged, it is important to develop protective infrastructures. Such infrastructures should enable reporting of security violations or misconduct on a regular basis with effortless incident submission, automatic classification of reported incidents, searching and collective knowledge extraction from similar incidents and sharing of information by authorized users. We report on such a system currently being developed. The Security Incident Sharing and Classification system (SISC), collects incidents in a database, though its incident submission interface, and classifies them according to different parameters. We demonstrate an automatic classification scheme based on the level of incident severity, where severe incidents are processed faster. The system builds trust through its monitoring and recommendation capabilities, thus preparing enterprises to encounter new security incidents that may arise. This is an open, customizable, self-standing risk monitoring system which can be built into any enterprise. The recommendation component of SISC extracts solution scenarios from the gathered knowledge of classified incidents and makes them available to SISC users. 2 CROSS-MEDIA SERVICE DELIVERY
منابع مشابه
تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراکگذاری اطلاعات در شبکههای اجتماعی موبایل: نقش تعدیلکننده متغیر جنسیت
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
متن کاملGuest Editorial: Special issue on privacy and trust management in cloud and distributed systems
W ITH the continuous drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. We are now witnessing vast amounts of privacy-sensitive data being collected, sometimes unintentionally, in a myriad of different types of networks. Unauthorized disclosure, modification, usage, or denial of access to these data may result in high human and financia...
متن کاملIdentification of factors influencing building initial trust in e-commerce
Nowadays, consumer trust is identified as one of the most important factors in electronic commerce (e-commerce) growth. This has led much research to investigate the role of trust in e-commerce and determine the factors which influence trust in this area. This paper explores factors which are engaged in building initial consumer trust in online shopping when a consumer wants to buy from a websi...
متن کاملBuilding Response Capacity through Cross-boundary Information Sharing: The Critical Role of Trust
Governments around the world are increasingly turning to information sharing and integration to help solve problems in a wide range of programs and policy areas. These complex interorganizational efforts face not only the technical challenges of many information technology initiatives, but also the difficulties derived from interacting among multiple and diverse organizations. Trust has been id...
متن کاملTrust Building In The Creation Of Virtual Enterprises In Mobile Agent-Based Architectures
Supported by CNPq – The Brazilian Council for Research and Scientific Development. This paper presents an approach for a partners search and selection system to support the creation of Virtual Enterprises from a cluster of existing companies. This process is carried out in an agile, smart and secure manner, three basic enabling elements to enhance trust building inside the cluster. This approac...
متن کامل