Search results for "Security framework"

showing 2 items of 2 documents

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

Security frameworkProcess managementService oriented systemsComputer Networks and CommunicationsComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologylcsh:Telecommunicationlcsh:TK5101-6720security level0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Electrical and Electronic EngineeringArchitectureService orientedSecurity levelService-oriented systems021110 strategic defence & security studieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryInformation technologyComputer Science Applicationssecurity incidents020201 artificial intelligence & image processingbusinessJournal of Information and Telecommunication
researchProduct

Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic

2021

Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…

threat detectionorganisaatiotTK5101-6720threat analysiscyber defensetietotekniikkacybersecurity frameworktestauscyber attack simulationTelecommunicationsimulointisoctietoturvakyberturvallisuusverkkohyökkäyksetexploitationpalomuurit (tietoturva)
researchProduct