【24h】

Preface

机译:前言

获取原文
获取原文并翻译 | 示例

摘要

Enterprise security is an important area since all types of organizations require secure and robust environments, platforms, and services to work with people, data, and computing applications. There are instances where security breaches and privacy concerns have been the main factors preventing organizations from putting their resources in public and community domains. Even in private domains, there is no escape from the threats to cyber security, privacy, trust, and risk. We live in an information age whereby there is a massive and rapid dissemination of information. Protecting our data, privacy, and rights has become increasingly important regardless of where we are based and in which organization we work. Challenges such as data ownership, trust, unauthorized access, and big data management should be resolved by using innovative methods, models, frameworks, case studies, and analysis to reduce risks imposed by data leakage, hacking, breach of privacy, and abuse of data. To adopt the best practices, papers that can fully address security, privacy, and risk concerns are welcome. We seek papers from both technical security (theory, prototype, experiments, simulations, proofs-of-concept, and product development) and information system security (review, frameworks, best practices, statistical analysis based on surveys and recommendations) that provide good recommendations and research contributions to enterprise security. The best papers from the ES 2015 workshop were selected for this book. This book presents comprehensive and intensive research into various areas of enterprise security including a chapter on "Challenges of Cloud Forensics" by Hamid Jahankhani and Amin Hosseinian-Far, who discuss how cloud computing has generated significant interest in both academia and industry, but it is still an evolving paradigm. Cloud computing services are also a popular target for malicious activities, resulting in the exponential increase of cyber attacks. Digital evidence is the evidence that is collected from the suspect's workstations or electronic media that could be used to assist computer forensics investigations. Cloud forensics involves digital evidence collection in the cloud environment. The current established forensic procedures and process models require major changes in order to be acceptable in a cloud environment. This chapter aims to assess the challenges that forensic examiners face in tracking down and using digital information stored in the cloud and discusses the importance of education and training for handling, managing, and investigating computer evidence.
机译:由于所有类型的组织都需要安全可靠的环境,平台和服务才能与人员,数据和计算应用程序一起工作,因此企业安全性是一个重要领域。在某些情况下,安全漏洞和隐私问题已成为阻止组织将其资源投入公共和社区领域的主要因素。即使在私有域中,也无法逃脱对网络安全,隐私,信任和风险的威胁。我们生活在一个信息时代,在这个时代,信息的大规模快速传播。无论我们身在何处以及在哪个组织工作,保护我们的数据,隐私和权利都变得越来越重要。应通过使用创新的方法,模型,框架,案例研究和分析来解决诸如数据所有权,信任,未经授权的访问和大数据管理之类的挑战,以减少由数据泄漏,黑客入侵,侵犯隐私和滥用数据带来的风险。要采用最佳实践,欢迎可以完全解决安全性,隐私和风险问题的论文。我们从技术安全性(理论,原型,实验,模拟,概念验证和产品开发)和信息系统安全性(综述,框架,最佳实践,基于调查和建议的统计分析)中寻求能够提供良好建议的论文以及对企业安全性的研究贡献。本书从ES 2015研讨会上选出了最好的论文。本书对企业安全的各个领域进行了全面而深入的研究,其中包括Hamid Jahankhani和Amin Hosseinian-Far撰写的“云取证挑战”一章,他们讨论了云计算如何引起学术界和行业的极大兴趣,但是仍然是一个不断发展的范例。云计算服务也是恶意活动的流行目标,导致网络攻击呈指数级增长。数字证据是从犯罪嫌疑人的工作站或电子媒体收集的证据,可用于协助计算机取证调查。云取证涉及在云环境中收集数字证据。当前建立的取证程序和流程模型需要进行重大更改,才能在云环境中被接受。本章旨在评估法医检查人员在跟踪和使用存储在云中的数字信息时面临的挑战,并讨论了教育和培训对于处理,管理和调查计算机证据的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号