2017
DOI: 10.1007/978-3-319-59439-2
|View full text |Cite
|
Sign up to set email alerts
|

Data Analytics and Decision Support for Cybersecurity

Abstract: the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…There must be some kind of rules to manage all this traffic and data, thus arising the use of big data security analysis (Dewa A., 2016) Any illegal activity or an act carried with the help of any computer technology device or network is considered as a cybercrime and violation of act of privacy and intrusion. There are many ways and classes of cybercrime which are also considered as terrorism such as try to attempt to authenticate access or pass any service or business network in an illegitimate manner (Moustafa, Creech, & Slay, 2017a) A number of solutions were presented and adopted after the increase in cybercrime and internet terrorism because it affected a great number of organizations all over the globe. Its solutions are first line security measures which are Firewall (A trusted network system designed especially for security purposes which monitors the traffic of any network upon basis of predetermined rules and regulations) , Cryptography (use of different coding techniques for data communication security in the presence of adversaries or third parties) and second-line security solution is the use of intrusion detection system (IDS) which is basically a software developed application or a computer-controlled device that continuously 24/7 monitors the whole system of an organization or a network for any kind of illegal intrusion, act, access, violation of companies policies authorization or malicious activity(Ata, 2017)Upon detection of the above mentioned the IDS acts immediately and effectively informing and alarming the client, administrator in control at the same time by its event management system known as SIEM.…”
Section: Introductionmentioning
confidence: 99%
“…There must be some kind of rules to manage all this traffic and data, thus arising the use of big data security analysis (Dewa A., 2016) Any illegal activity or an act carried with the help of any computer technology device or network is considered as a cybercrime and violation of act of privacy and intrusion. There are many ways and classes of cybercrime which are also considered as terrorism such as try to attempt to authenticate access or pass any service or business network in an illegitimate manner (Moustafa, Creech, & Slay, 2017a) A number of solutions were presented and adopted after the increase in cybercrime and internet terrorism because it affected a great number of organizations all over the globe. Its solutions are first line security measures which are Firewall (A trusted network system designed especially for security purposes which monitors the traffic of any network upon basis of predetermined rules and regulations) , Cryptography (use of different coding techniques for data communication security in the presence of adversaries or third parties) and second-line security solution is the use of intrusion detection system (IDS) which is basically a software developed application or a computer-controlled device that continuously 24/7 monitors the whole system of an organization or a network for any kind of illegal intrusion, act, access, violation of companies policies authorization or malicious activity(Ata, 2017)Upon detection of the above mentioned the IDS acts immediately and effectively informing and alarming the client, administrator in control at the same time by its event management system known as SIEM.…”
Section: Introductionmentioning
confidence: 99%
“…Permissions inform the user that an application requests access to some information which might be dangerous to personal data [3]. If an application poses danger to the requested information, the user can decline its installation or running, after that, the application exits.…”
Section: Introductionmentioning
confidence: 99%