期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
1
作者 Joseph E. Mbowe simon s. msanjila +1 位作者 George s. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 Security Threats Analytic Threat Visualization Security Management Automated Security Policies
下载PDF
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
2
作者 Joseph Elias Mbowe Irina Zlotnikova +1 位作者 simon s. msanjila George s. Oreku 《Journal of Information Security》 2014年第4期166-177,共12页
The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organizatio... The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organization to another, it prompts the threat analysis tools be integrated with organization’s information security policy so as to ensure security controls at local settings. However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e.?confidentiality, integrity and availability) based on organization’s risk appetite and culture. The information security policy serves as a tool to provide guidance on how to manage and secure all business operations including critical assets, infrastructure and people in the organization. This guidance (e.g. usage and controls) facilitates the provisions for threat assessment and compliance based on local context. The lack of effective threat assessment frameworks at local context have promoted the exposure of critical assets such as database servers, mails servers, web servers and user smart-devices at the hand of attackers and thus increase risks and probability to compromise the assets. In this paper we have proposed a conceptual framework for security threat assessment based on organization’s information security policy. Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation without depending on security expertise. 展开更多
关键词 CRITICAL ASSET INFORMATION SECURITY INFORMATION SECURITY POLICY THREAT Analysis THREAT Assessment SECURITY THREAT Visualization
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部