2017
DOI: 10.3390/systems5040052
|View full text |Cite
|
Sign up to set email alerts
|

An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence

Abstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT research and develops new security tools. Therefore, our study focuses on the design of an integral model based on Business Intelligence (BI), which provides reactive and proactive services in a CSIRT, in order to alert and reduce any suspicious or malicious activity on information systems and data networks. To achieve this purpose, a solution has been assembled, that generates information stores, being compiled from a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…Data warehouses and centers are the most often used. A data warehouse (DW) is an integrated collection of subject-oriented decision support data [29]. Data warehousing (DW) is a specific type of information system and should enable the acquisition of business data, its transformation into appropriate strategic business information, and subsequent storage of data in a format that facilitates business analysis [30].…”
Section: Cloud Storagementioning
confidence: 99%
“…Data warehouses and centers are the most often used. A data warehouse (DW) is an integrated collection of subject-oriented decision support data [29]. Data warehousing (DW) is a specific type of information system and should enable the acquisition of business data, its transformation into appropriate strategic business information, and subsequent storage of data in a format that facilitates business analysis [30].…”
Section: Cloud Storagementioning
confidence: 99%
“…For the design of the guide, it is necessary to analyze the security procedures; the existing resources to mitigate an incident. In addition, the structural model that it uses is considered and the situation in which it finds itself, in addition to the university where the model is applied, is examined [14]. This analysis is used to determine positive impact areas when establishing an information incident response team.…”
Section: Analysis For the Creation Of An Academic Csirtmentioning
confidence: 99%
“…Therefore, the RMP management activities for Information Security (IS) and Data Privacy (DP) related measures must be adapted. According to previous research (Ande et al, 2020;Bhamare et al, 2020;Ganin et al, 2020;Pandey et al, 2020), the RMP approaches to information security are indispensable for the application and management of cybersecurity (Fuertes et al, 2017). The paper is intended to present the management of cyber security risks using an RMP and to show a method for quantifying the risks.…”
Section: Introductionmentioning
confidence: 99%