首页> 外文会议>IEEE International Conference on Future Internet of Things and Cloud Workshops >Taxonomy for Unsecure Big Data Processing in Security Operations Centers
【24h】

Taxonomy for Unsecure Big Data Processing in Security Operations Centers

机译:安全运营中心未充分的大数据处理的分类

获取原文

摘要

While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.
机译:虽然媒体不断描述新的攻击,但对于他们的业务保护的组织必须认真关注他们的业务保护,以便对其IT基础架构进行这种复杂的攻击。因此,具有安全运营中心(SoC)的适当设计和正式的信息安全(IS)管理系统,因为从未以前则需要其中心。在SOC最重要的文件中,有两项政策:是政策,是事件管理政策。为了创造一个真正有效的政策,它至关重要地将SoC的操作环境从IS观点进行了充分描述。本文提出了对这些目的的需求,是威胁,漏洞,攻击的威胁,漏洞,攻击以及作为应避免的负面元素的事件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号