2011
DOI: 10.1007/978-3-642-21040-2_23
|View full text |Cite
|
Sign up to set email alerts
|

STORM - Collaborative Security Management Environment

Abstract: Abstract. Security Management is a necessary process in order to obtain an accurate security policy for Information and Communication Systems (ICS). Organizations spend a lot of money and time to implement their security policy. Existing risk assessment, business continuity and security management tools are unable to meet the growing needs of the current, distributed, complex IS and their critical data and services. Identifying these weaknesses and exploiting advanced open-source technologies and interactive s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…The lack of interoperability among security tools results in more responsibility on human experts (briefly explained in section 5.2) and leads to redundant, complex, inefficient incident response process. Existing security management and risk assessment solutions are not designed to collaborate [77]. These solutions do not consider several aspects that affect the evaluation criteria of the threats and vulnerabilities thus make the security procedures incomplete.…”
Section: Technical Challengesmentioning
confidence: 99%
See 4 more Smart Citations
“…The lack of interoperability among security tools results in more responsibility on human experts (briefly explained in section 5.2) and leads to redundant, complex, inefficient incident response process. Existing security management and risk assessment solutions are not designed to collaborate [77]. These solutions do not consider several aspects that affect the evaluation criteria of the threats and vulnerabilities thus make the security procedures incomplete.…”
Section: Technical Challengesmentioning
confidence: 99%
“…Learning. A set of studies have used Artificial Intelligence (AI) technique and game theory model to make security system intelligent [21,44,48,66,73,77]. McAfee has proposed to expand the security orchestration platform capabilities by including behavioral security; for example, pre-execution, postexecution, machine learning and more [12].…”
Section: 23mentioning
confidence: 99%
See 3 more Smart Citations