The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today numerous information security (IS) incidents in organizations' networks have become not only more sophisticated but also damaging. Hence the systems with proper security services in place to mitigate and promptly respond to IS threats by helping organizations better understand their current network situation, as well as to perform routine work in big IS-related data processing in automatic mode...
In the 21st century, integrated transport, service and mobility concepts for real-life situations enabled by automation system and smarter connectivity. These services and ideas can be blessed from cloud computing, and big data management techniques for the transport system. These methods could also include automation, security, and integration with other modes. Integrated transport system can offer...
With a lot of technological advancements in recent years the data generation has increased as an outcome, large amount of data is being generated which is a major issue to the organization, as an example social media is flooding data each day, which is unmanageable. Here in this paper we would discuss the various risks and issues which are associated with big data. Big Data as itself describes the...
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media, specifically through Twitter. This paper first provides...
Wisdom aligns with technology is the key factor for sustainable business development. By increasing amount of public and private data, organizations need to find new solutions to manage data and information which lead to knowledge, better decision making, and value. In the big data-bang, smart organization surfing on-line technology and start planning big data strategy. However, many organizations...
Organizations are now in an era of scale, where the volumes of data gathered, processed and stored is breaking down every architectural construct in the storage industry. This have seen organizations improve their analytics processes such as acquiring and using big data analytics tools as well as increasing their bandwidth and storage devices in order to boost their operational efficiency with little...
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of...
The digitalization of our day-to-day activities has resulted in a huge volume of data. This data, called Big Data, is used by many organizations to extract valuable information either to take marketing decisions, track specific behaviors or detect threat attacks. The processing of such data is made possible by using multiple techniques, called Big Data Analytics, which allow getting enormous benefits...
Security reports published by leading companies reveal the growing number of cyber attacks. Thefts of money or sensitive data, harm the reputation of organizations and sabotage of national critical infrastructures are some of the motivations behind these attacks. The sophistication of these attacks is very high, creating major challenges to the detection and mitigation in useful time. In this context...
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how...
Society is transforming into logically more instrumented and therefore, association's zone unit fabricating and putting away massive measures of information. Overseeing and picking up bits of knowledge from the made learning might be a test and key to upper hand. Investigation arrangements that procedure organized and unstructured data are vital as they will encourage associations pick up bits of...
Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computing infrastructure of an organization requires appropriate response mechanism on the part of the organization. Government agencies and regulatory bodies are imposing the requirements of risk assessments on a continuous basis. One important aspect of continuous risk monitoring is using a suitable risk...
To analyze data that is streamed into a real-time computation system has gained traction and is very useful in use cases where for example telecom networks should be optimized dynamically. For this analysis lots of data i.e., Big data is used. This nevertheless also poses privacy risks as this data usually also contains personal data and not only core applications of an organization want to access...
Big Data refer to the analysis of significantly large collection of data that may contain user data, sensor data or machine data. An analyzed Big Data can deliver new business insights, open new markets and create competitive advantages. It consists of data sets that are of large magnitude (Volume), large collection of data which diverse representation include structured, semi structured, or unstructured...
Now-a-days for most of the organizations across the globe, two important IT initiatives are: Big Data Analytics and Cloud Computing. Big Data Analytics can provide valuables insight that can create competitiveness and generate increased revenues. Cloud Computing can enhance productivity and efficiencies thus reducing cost. Cloud Computing offers groups of servers, storages and various networking resources...
Data is growing rapidly by the business, consumers and government. To maintain and protect the data, there are rules with service level agreements. Service level agreements are major considerations for each consumer. Each Consumer has a Service Level Agreement specifies that, it has an obligation on performance and service's Quality that is retrieved from the system. Service level agreement is a negotiated...
Smart worlds begin with smart things, such as smart objects, smart cities, smart manufacturing, and smart systems, are overlaid with sensing and actuation, many embedded in things, and eventually encompass all aspects of the cyber, physical, social, and thinking hyperspace. In the future, human beings will live in a smart environment where both life and work are well addressed by technology, whereas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.