2021
DOI: 10.1007/s42979-021-00858-4
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes

Abstract: The approach presented in this paper provides effective protection of critical business processes by applying advanced SIEM technology in a rigorous fashion, based on the results of accurate risk assessment. The proposed SIEM tool advances the State of The Art of the technology along two axes, specifically: privacy and integrity. The advancements are achieved via combined use of two of the most promising technologies for trusted computing, namely: Trusted Execution Environment (TTE) and Homomorphic Encryption … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…4, this architecture is wellrounded. It incorporates log monitoring, threat intelligence, asset inventory, configuration assessment, compliance monitoring, and automated incident response to detect and respond to security issues [15][16][17][18][19].…”
Section: Architecturementioning
confidence: 99%
“…4, this architecture is wellrounded. It incorporates log monitoring, threat intelligence, asset inventory, configuration assessment, compliance monitoring, and automated incident response to detect and respond to security issues [15][16][17][18][19].…”
Section: Architecturementioning
confidence: 99%
“…In the above context, the deployment of SIEM solutions is expected. SIEMs improve incident detection, speed up incident management, and enforce adherence to specific regulatory compliance needs [ 41 ].…”
Section: Motivating Casesmentioning
confidence: 99%
“…Both firms use the Gartner Magic Quadrant as their starting point for study (Balayla Jacques 2020), putting the more complex factors to the side for consideration in upcoming SIEMs. Similar to this, businesses like Solutions Review by (Luigi et al,2022) provides periodic studies to help SIEM purchasers choose the best SIEM solution for their companies. The authors conduct a vendor comparison map focused on compliance, log management, and threat detection, three essential SIEM characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…The media, the security community, and the IT sector have in recent times focused on security due to extremely significant cyberattacks. The Solar Winds breach in 2019 affected the network management systems of numerous organizations (Luigi et al, 2022). This resulted in significant data leaks and caused a great deal of damage.…”
Section: Introductionmentioning
confidence: 99%