2020
DOI: 10.1016/j.future.2020.07.015
|View full text |Cite
|
Sign up to set email alerts
|

New approach for threat classification and security risk estimations based on security event management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…An important feature of such a violation of access to big data is the absence of anomalies in the traffic level. Obtaining the individual characteristics of users [3], the peculiarities of working with the same type of user group with the system, will also increase the efficiency of data storage by structuring the most likely data requests, and will also allow one to form a client-oriented interface based on user preferences.…”
Section: Discussionmentioning
confidence: 99%
“…An important feature of such a violation of access to big data is the absence of anomalies in the traffic level. Obtaining the individual characteristics of users [3], the peculiarities of working with the same type of user group with the system, will also increase the efficiency of data storage by structuring the most likely data requests, and will also allow one to form a client-oriented interface based on user preferences.…”
Section: Discussionmentioning
confidence: 99%
“…To perform the optimization procedure, a computational system was implemented according to the experimental design. The system complied with the secure software development guidelines specified in ( Sancho, Caro & Rodríguez (2020) and the considerations on security risk estimations presented in Sancho et al (2020) . They contributed to the development of a secure system, especially considering the importance and significance of research related to food technology in relation to food safety.…”
Section: Methodsmentioning
confidence: 99%
“…Thus, prioritizing alerts is an important task. Sancho et al [148] propose a threat level rating model that evaluates the SIEM output. The authors classify threats and assign four priority levels: critical, important, moderate, and low.…”
Section: Audit Review and Analysismentioning
confidence: 99%