The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The centralized zone data service (CZDS) was introduced by the Internet Corporation for Assigned Names and Numbers (ICANN) to facilitate sharing and access to zone data of the new generic Top-Level Domains (gTLDs). CZDS aims to improve the security and transparency of the naming system. In this paper, we investigate CZDS's transparency by measurement. By requesting access to zone data of all gTLDs...
Information security management is a complicated task in cloud environment. Cloud service layers and multi-tenant architecture have created a complicated environment for developing and managing a monitoring and incident response environment in organizations. The main goal of this paper is to receive and analyze events from OpenStack environment. Events and system logs are received from OpenStack environment...
In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs)....
The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user, any variation from normal of abnormal activity could indicate that a...
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of...
This study examined the hypothetical model of job security, job satisfaction, and perceived safety, as antecedences for driving behavior. Data collection from 360 motorcyclists, as survey respondent, in Jakarta, utilized purposive-sampling technique, with four instruments which reliabilities were calculated using Cronbach's Alpha. The goodness of fit and the validity of the Hypothetical model were...
Efforts to understand what goes on in the mind of an insider have taken a back seat to developing technical controls, yet insider threat incidents persist. We examine insider threat incidents with malicious intent and propose an explanation through a relationship between Dark Triad personality traits and the insider threat. Although Dark Triad personality traits have emerged in insider threat cases...
The new undergraduate colleges is the useful supplement of current higher education in China, and is the cornerstone for promoting EFA(Education For All). However, the teaching quality of these colleges has affected to a certain extent due to the incensement of the number of students, the decline of the quality of students, and the shortage of teachers. The PDCA method is a mature ring management...
The literature study indicates that the number of empirical studies on the relationship between work values and job performance of employees are very low, and the results are not complimentary. Although many scholars provide a considerable amount of research regarding the relationship between the work values of an employee and his job performance, few studies take the influence an enterprise environment...
The Insider Threat Security Reference Architecture, ITSRA, provides an enterprise wide solution to insider threat. The architecture consists of four security layers -- Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer in order to address insider attacks. Each layer does not function in isolation or independently of other layers. Rather, the...
As electronic commerce develops, its success critically depends on establishing, maintaining and managing customer trust in e-commerce Web sites. This paper identifies critical success factors that enhance customer trust in e-commerce Web sites and examines those factors in relation to the e-commerce success metrics using qualitative and quantitative methods. The result suggests that certain functional,...
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, deploying a firewall is simply not enough since it needs to be configured by the system administrator according to the needs of the organization. There are many reasons due to which it is hard for the administrator to configure the firewall properly. Specifying firewall rule set is complicated and error...
The relation among job satisfaction, stress level and self-efficacy of safety staff in coalmine was investigated by a questionnaire survey conducted to 43 employees in a state-owned coalmine. The results showed as follows: stress level could predict job satisfaction negatively; self-efficacy could not only predict job satisfaction positively, but also adjust the effect of stress level on job satisfaction;...
Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be attacked. Early identification of defects has been a widely investigated topic in software engineering research. Early identification of software vulnerabilities can help mitigate these attacks to a large degree by focusing better...
The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of information systems security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the targeted architecture is developed in a distributed perspective and is composed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.