[go: up one dir, main page]

Meher, 2021 - Google Patents

Threat Handling using the NIST Framework in a Recruitment Environment

Meher, 2021

View PDF
Document ID
11835659994778807102
Author
Meher H
Publication year

External Links

Snippet

With a rising number of threats in the industry, small and mid-sized businesses experience several difficulties in managing the security of the information management systems. It has become essential to have a robust security service, such as a Security Operation Centre …
Continue reading at norma.ncirl.ie (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0775Content or structure details of the error report, e.g. specific table structure, specific error fields

Similar Documents

Publication Publication Date Title
Scarfone et al. Technical guide to information security testing and assessment
Miloslavskaya Security operations centers for information security incident management
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
CN118018300A (en) Terminal network access control system with network asset mapping function
Al-Matari et al. Integrated framework for cybersecurity auditing
Wright The IT regulatory and standards compliance handbook: How to survive information systems audit and assessments
Rawal et al. Cybersecurity and identity access management
Scarfone et al. Sp 800-115. technical guide to information security testing and assessment
Murthy et al. Database forensics and security measures to defend from cyber threats
Masood et al. A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks
Hristova et al. Security assessment methodology for industrial control system products
Mejri et al. Cloud security issues and log-based proactive strategy
Cui et al. Enterprise Security Incident Analysis and Countermeasures Based on the T-Mobile Data Breach
Gamilla et al. Building a barrier: A security operations center framework for a sustainable smart campus network
Kaur et al. An introduction to security operations
Meher Threat Handling using the NIST Framework in a Recruitment Environment
Flynn et al. Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations
Modderkolk Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle
Feagin The value of cyber security in small business
Gheorghică et al. A new framework for enhanced measurable cybersecurity in computer networks
Caldeira Security Information and Event Management (SIEM) Implementation Recommendations to Enhance Network Security
Hertteli Improving IT administration security by using security controls based on security frameworks
Parvanov et al. Threat modelling and vulnerability assessment for IoT solutions: a case study
Uushona et al. Network forensics in a BYOD environment
Saed et al. Data governance cloud security checklist at infrastructure as a service (IaaS)