首页> 外文会议>IEEE International Conference on Future Internet of Things and Cloud Workshops >Taxonomy for Unsecure Big Data Processing in Security Operations Centers
【24h】

Taxonomy for Unsecure Big Data Processing in Security Operations Centers

机译:安全运营中心中不安全大数据处理的分类法

获取原文

摘要

While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.
机译:当媒体不断描述新的攻击时,组织必须认真考虑其业务保护,以应对针对其IT基础架构的此类复杂攻击。因此,前所未有的需要以安全运营中心(SOC)为中心的,经过适当设计和正规化的信息安全(IS)管理系统。在SOC的最重要文件中,有两项策略:IS策略和IS事件管理策略。为了制定真正有效的政策,从IS的角度充分描述SOC的运营环境至关重要。本文提出了针对这些目的的IS威胁,漏洞,攻击和IS事件的分类(分类法)的最大需求,这是应避免的负面因素。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号