Adaptive Monitoring of Companies' Information Security
Abstract
Full Text:
PDFReferences
B., Lakhno, M., Gulmira, Y. A Model for Managing the Procedure of Continuous Mutual Financial Investment in Cybersecurity for the Case with Fuzzy Information, (2022) Lecture Notes on Data Engineering and Communications Technologies, 93, pp. 539-553.
Begun AV, Osipova OI, Urdenko OG Pro odnu z sytuatsiynykh modeley upravlinnya informatsiynoyu bezpekoyu pidpryyemstva [About one of the situational models of information security management of the enterprise]. Modeling and information systems in economics: collection. Science. pr. / Ministry of Education and Science of Ukraine, SHEI "Kyiv. nat. econ. Univ. Vadim Hetman "; [editor: OE Kaminsky (ed.), etc.]. - Kyiv: KNEU, 2020. - Issue. 100. - P. 39–50.
Bhatt, S., Manadhata, P. K., & Zomlot, L. (2014). The operational role of security information and event management systems. IEEE security & Privacy, 12(5), 35-41.
Culot, G., Nassimbeni, G., Podrecca, M., & Sartor, M. (2021). The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. The TQM Journal.
Fonseca-Herrera, O. A., Rojas, A. E., & Florez, H. (2021). A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci, 48(2), 213-222.
Gabriel, R., Hoppe, T., Pastwa, A., & Sowa, S. (2009, March). Analyzing malware log data to support security information and event management: Some research results. In 2009 First International Confernce on Advances in Databases, Knowledge, and Data Applications (pp. 108-113). IEEE.
ITIL Service Operation Second edition. 2011. С. 58-72.
Kang, K., & Kim, J. (2015). A case study on converged security with event correlation of physical and information security. International Journal of Security and Its Applications, 9(9), 77-94.
Khokh, V. D., Meleshko, E. V., & Smirnov, O. A. (2017). Doslidzhennya metodiv audytu system upravlinnya informatsiynoyu bezpekoyu. [Follow-up methods for auditing information security management systems]. Management systems, navigation and communication. Collection of scientific works, 1(41), 38-42.
Ključnikov, A., Mura, L., & Sklenár, D. (2019). Information security management in SMEs: factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081.
Ko, K., Kim, H. K., Kim, J., Lee, C. Y., Cha, S. G., & Jeong, H. C. (2009, August). Design and Implementation of SIP-aware Security Management System. In International Workshop on Information Security Applications (pp. 10-19). Springer, Berlin, Heidelberg.
Kuznetsov, A. V. (2015). A method of organizing the event management process in terms of their processing within the enterprise information security management system. Information security issues, (2), 57-62.
Lakhno, V., Plyska, L. Analysis of Models for Selection of Investment Strategies, (2021) 2020 IEEE International Conference on Problems of Infocommunications Science and Technology, PIC S and T 2020 - Proceedings, № 9468024, pp. 43-46.
Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248.
Lopez, M. A., Silva, R. S., Alvarenga, I. D., Rebello, G. A., Sanz, I. J., Lobato, A. G., & Pujolle, G. (2017, October). Collecting and characterizing a real broadband access network traffic dataset. In 2017 1st Cyber Security in Networking Conference (CSNet) (pp. 1-8). IEEE.
Miller D. et al. Security information and event management (SIEM) implementation. – McGraw-Hill, 2011.
Nadezhdin, E. N., & Belyanskaya, O. V. (2019). K voprosu analiza ustoychivosti sistemy upravleniya riskami informatsionnoy bezopasnosti. In Sovremennyye instrumental'nyye sistemy, informatsionnyye tekhnologii i innovatsii. [On the issue of stability analysis of the information security risk management system]. In Modern tool systems, information technology and innovation (pp. 144-148).
National Institute of standards and technology. Special Publication 800-92. Guide to Computer Security Log Management. 2006. - 61 p
Ovcharenko M. Yu. Analysis of correlation rules in information security and security management systems / M. Yu. , 8–9 April 2021 - VA ZS AR; NTU "KhPI"; NAU, SE "PDPRONDIAVIAPROM"; UmZh, 2021. - Vol. 2, sections 3-5.– pp. 46.
Poltavtseva, M. A., & Zegzhda, D. P. (2020). Adaptive monitoring of CFS information security from the point of view of a systematic approach. Methods and technical means of ensuring information security, (29), 88. pp. 1661-1669.
Renners, L., Heine, F., & Rodosek, G. D. (2017, September). Modeling and learning incident prioritization. In 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (Vol. 1, pp. 398-403). IEEE.
Shatnawi, M. M. (2019). Applying Information Security Risk Management Standards Process for Automated Vehicles. Bánki Közlemények (Bánki Reports), 2(1), 70-74.
Sievierinov O.V., Ovcharenko M.Y. Analysis of correlation rules in Security information and event management systems. Computer and information systems and technologies. 2020. P. 24-25.
Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & management, 46(5), 267-270.
Tanadi, Y., Soeprajitno, R. R. W. N., Firmansah, G. L., & El Karima, T. (2021). ISO 27001 Information Security Management System: Effect of Firm Audits in Emerging Blockchain Technology. Riset Akuntansi dan Keuangan Indonesia, 6(2), 198-204.
Ushatov V., Severinov O.V. Problems of operational detection and response to information security incidents. – Kharkiv: KNURE, 2019. - pp. 104–105. (2019).
White, G. (2021). Generation Z: Cyber-Attack Awareness Training Effectiveness. Journal of Computer Information Systems, 1-12.
Wu, W., Shi, K., Wu, C. H., & Liu, J. (2021). Research on the Impact of Information Security Certification and Concealment on Financial Performance: Impact of ISO 27001 and Concealment on Performance. Journal of Global Information Management (JGIM), 30(3), 1-16.
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933