The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today numerous information security (IS) incidents in organizations' networks have become not only more sophisticated but also damaging. Hence the systems with proper security services in place to mitigate and promptly respond to IS threats by helping organizations better understand their current network situation, as well as to perform routine work in big IS-related data processing in automatic mode...
The paper presents the work-in-progress in developing since 2016 and using the "Network Security Intelligence" educational and research center (NSIC) in the framework of the NRNU MEPhI's Institute of Cyber Intelligence Systems (ICIS). The NSIC currently consists of two bearing laboratories with Next-Generation Firewall (NGFW) and Data Loss Prevention (DLP) system as their cores respectively...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Use of wearable fitness trackers is progressively increasing over the world. The raw information from these gadgets on processing produces Electronic Health Record (EHR). It has great importance since it enhances the scope of medicinal services with financially savvy nature. Despite this fact, the human health architecture are tested essentially by security and ownership of information. Securing EHR...
This article describes the preparation of a Wi-Fi wireless network in production system, with intrusion detection systems Snort and Kismet; for subsequent evaluation under attack. Through Penetration Testing with Backtrack 5 R3 using Fern WiFi Cracker and Ettercap to monitor response reaction of IDSs. Once the attacks are completed, the results are analyzed, in terms of the captured traffic by the...
Information security management is a complicated task in cloud environment. Cloud service layers and multi-tenant architecture have created a complicated environment for developing and managing a monitoring and incident response environment in organizations. The main goal of this paper is to receive and analyze events from OpenStack environment. Events and system logs are received from OpenStack environment...
Given service logs of who used what service, and when, how can we find intrusions and anomalies? In this paper, a cyber threat detection framework - ChainSpot was proposed, in which the novelty is to build graphical patterns by summarizing user's sequential behaviors of using application-layer services, and to discover deviations against one's normal patterns. Besides modeling, the issue of justifying...
The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user, any variation from normal of abnormal activity could indicate that a...
Information Technology (IT) within Secretariat General of The Indonesian House of Representatives has important role to support the Member of Parliaments (MPs) duties and functions and therefore needs to be well managed to become enabler in achieving organization goals. In this paper, IT governance at Secretariat General of The Indonesian House of Representatives is evaluated using COBIT 5 framework...
The provision of elderly home-monitoring systems to enhance aging-in-place requires the service to meet the needs of both the elderly and their caregivers. The design of such IT services requires interdisciplinary efforts to look beyond the technical requirements. Taking a value-inspired design perspective, the study argues that service design for promoting aging-in-place needs to reconcile the values...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. This paper introduces a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. We use open information and standardized, non-proprietary...
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how...
Nuclear facilities need very strict security mechanism to prevent unauthorized persons from gaining access to critical facility or approaching close enough to harm the facility. Physical Access Control System plays an important role in ensuring the entry of authorized personnel into the premises. There are so many ways by which this system can be designed and implemented, wherein the authenticity...
Arctic conditions and the territorial politico-economic crisis in Ukraine are two different types of extreme conditions, where civilian authorities need to use Remotely Piloted Aircraft Systems (RPAS) to support manned processes and other information systems. Due to the lack of adequate research and publications, best practice may remain unshared. Therefore authorities may not be aware of potential...
Over the years cyber attacks have turned more sophisticated, directed and lethal. In the recent times attackers have found new means to bypass advanced and sophisticated methods like sandboxing. Sandboxes emulate and analyze behavior and network in an isolated environment. Forensic investigations are performed by combining static analysis with sandbox analysis. The limitation with sandboxing is simulating...
A targeted attack affects all terminals in a network. Therefore, in order to properly deal with such an attack, it is necessary to analyze the event information for each terminal in the network as well as all event information within the terminal. We have been studying a dynamic diagnostic method based on malware behavior in a network. We herein propose a malware detection method that works by dynamically...
The Internet is highly susceptible to routing attacks and there is no universally deployed solution that ensures that traffic is not hijacked by third parties. Individuals or organizations wanting to protect themselves from sustained attacks must therefore typically rely on measurements and traffic monitoring to detect attacks. Motivated by the high overhead costs of continuous active measurements,...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computing infrastructure of an organization requires appropriate response mechanism on the part of the organization. Government agencies and regulatory bodies are imposing the requirements of risk assessments on a continuous basis. One important aspect of continuous risk monitoring is using a suitable risk...
Privacy and security are the main concern of any social media network sites such as Facebook, Twitter, and Linked In etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Lack of attention to privacy and security on social media does seem to be odds with the belief as individual responsibility. Network virtualization, media independence and...
In this paper we discuss our experience of implementation of Data Loss Prevention (DLP) system at our University. The DLP system helps to analyze, control, monitor, block and protect data at the University. With the help of the DLP system and encryption we are able to protect and control the confidential data about our users, HR data, intellectual ownership data, legal and financial documentation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.