Meher, 2021 - Google Patents
Threat Handling using the NIST Framework in a Recruitment EnvironmentMeher, 2021
View PDF- Document ID
- 11835659994778807102
- Author
- Meher H
- Publication year
External Links
Snippet
With a rising number of threats in the industry, small and mid-sized businesses experience several difficulties in managing the security of the information management systems. It has become essential to have a robust security service, such as a Security Operation Centre …
- 230000000694 effects 0 abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0775—Content or structure details of the error report, e.g. specific table structure, specific error fields
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Scarfone et al. | Technical guide to information security testing and assessment | |
| Miloslavskaya | Security operations centers for information security incident management | |
| Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
| CN118018300A (en) | Terminal network access control system with network asset mapping function | |
| Al-Matari et al. | Integrated framework for cybersecurity auditing | |
| Wright | The IT regulatory and standards compliance handbook: How to survive information systems audit and assessments | |
| Rawal et al. | Cybersecurity and identity access management | |
| Scarfone et al. | Sp 800-115. technical guide to information security testing and assessment | |
| Murthy et al. | Database forensics and security measures to defend from cyber threats | |
| Masood et al. | A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks | |
| Hristova et al. | Security assessment methodology for industrial control system products | |
| Mejri et al. | Cloud security issues and log-based proactive strategy | |
| Cui et al. | Enterprise Security Incident Analysis and Countermeasures Based on the T-Mobile Data Breach | |
| Gamilla et al. | Building a barrier: A security operations center framework for a sustainable smart campus network | |
| Kaur et al. | An introduction to security operations | |
| Meher | Threat Handling using the NIST Framework in a Recruitment Environment | |
| Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations | |
| Modderkolk | Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle | |
| Feagin | The value of cyber security in small business | |
| Gheorghică et al. | A new framework for enhanced measurable cybersecurity in computer networks | |
| Caldeira | Security Information and Event Management (SIEM) Implementation Recommendations to Enhance Network Security | |
| Hertteli | Improving IT administration security by using security controls based on security frameworks | |
| Parvanov et al. | Threat modelling and vulnerability assessment for IoT solutions: a case study | |
| Uushona et al. | Network forensics in a BYOD environment | |
| Saed et al. | Data governance cloud security checklist at infrastructure as a service (IaaS) |