Filters








17,357 Hits in 3.5 sec

Engineering Forensic-Ready Software Systems Using Automated Logging

Fanny Rivera-Ortiz
2022 Requirements Engineering: Foundation for Software Quality  
A forensic-ready software system can produce logs that represent potential evidence in digital forensic investigations of potential security incidents.  ...  However, it is hard for developers to implement security logging, especially in large software systems, because it requires identifying only the relevant and necessary information to be logged to support  ...  Introduction A forensic-ready software system can produce logs that represent potential evidence in digital forensic investigations of potential security incidents.  ... 
dblp:conf/refsq/Rivera-Ortiz22 fatcat:7x4r2ji23vewrojc7fmvqbqvwi

Towards Automated Logging for Forensic-Ready Software Systems

Fanny Rivera-Ortiz, Liliana Pasquale
2019 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)  
In this paper, we propose a preliminary idea to automate the development of "forensic-ready" software systems.  ...  Security incidents can arise from the misuse of existing software systems.  ...  Automated generation of logging instructions removes from the software developers the burden of making decisions about where to log and what to log, to detect a set of security incidents.  ... 
doi:10.1109/rew.2019.00033 dblp:conf/re/Rivera-OrtizP19 fatcat:if2tmucuijbutgubkf73yaty6q

Using FDAF to bridge the gap between enterprise and software architectures for security

Lirong Dai, Kendra Cooper
2007 Science of Computer Programming  
The problem of effectively designing secure software systems to meet an organization's needs is a critical part of their success.  ...  This paper focuses on the problem of how to bridge the gap between enterprise and software architectures for security using a set of UML based notations: the Business Modeling Extension for UML, standard  ...  The logged events are stored in a separate relational database; the log data are encrypted for privacy Postconditions: If the customer data are successfully saved, then the customer data are updated in  ... 
doi:10.1016/j.scico.2006.10.010 fatcat:rf2zj5dpdrbpvmcg3qqvyblrai

Towards a Digital Forensic Readiness Framework for Public Key Infrastructure systems

Aleksandar Valjarevic, H. S. Venter
2011 2011 Information Security for South Africa  
A forensic investigation of digital evidence is commonly employed as a postevent response to a serious information security incident.  ...  PKI systems are today one of the most accepted and used technologies to enable successful implementation of information systems security services such as authentication and confidentiality.  ...  The authors see the DFR model for PKI systems as schematic representation of the process to be followed when implementing DFR for PKI systems. The paper is structured as follows.  ... 
doi:10.1109/issa.2011.6027536 fatcat:vhkt7xnpb5ford7tbcniiee77q

Best Practices for Establishment of a National Information Security Incident Management Capability (ISIMC)

Morné Pretorius, Hombakazi Ngejane
2019 The African journal of information and communication  
The South African Government's National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National  ...  Cybersecurity Hubmore correctly referred to as an information security incident management capability (ISIMC).  ...  It is assumed that requirements will be canvassed and a standardised set of computer systems and software adopted in order to reduce workload regarding detection automation, and to reduce development costs  ... 
doi:10.23962/10539/28656 fatcat:p7uya6j2x5eaji5w35btutdu6q

On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach

Joseph E. Mbowe, Simon S. Msanjila, George S. Oreku, Khamisi Kalegele
2016 Journal of Software Engineering and Applications  
The integration of organisation's information security policy into threat modeling enhances effectiveness of security strategies for information security management.  ...  These security policies are the ones which define the sets of security issues, controls and organisation's commitment for seamless integration with knowledge based platforms in order to protect critical  ...  Acknowledgements This research is supported by the Nelson Mandela Institution of Science and Technology under the research grant from the Commission for Science and Technology (COSTECH), Tanzania.  ... 
doi:10.4236/jsea.2016.912041 fatcat:zxmt6llf7vgura4el3yhwxlzqq

An Inter-Banking Auditing Security Solution For Detecting Unauthorised Financial Transactions Entered By Authorised Insiders

C. A. Corzo, N. Zhang, F. Corzo
2011 Zenodo  
The new security solution contemplates any two parties interacting on the basis of financial transactions recorded by their users in related but distinct automated financial systems.  ...  Insider abuse has recently been reported as one of the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions  ...  CSD financial services' infrastructure interdependence In the CSD-link model, each CSD system is connected directly to all the CSD systems where connections are required in order to perform a securities  ... 
doi:10.5281/zenodo.1075055 fatcat:w32fe5x5uzan3cbvobibh4uxwm

A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems

Lirong Dai, Kendra M. L. Cooper
2007 International Journal of Network Security  
There has been a growing interest in investigating methodologies to support the development of secure systems in the software engineering research community.  ...  At this point, a survey for researchers involved in the problem of systematically modelling and analyzing software architecture design that have security properties would be of value to the community.  ...  Software Architecture Model Software Architecture Model (SAM) [17] In [31] , SAM is applied to support the formal design of software architecture for secure distributed systems.  ... 
dblp:journals/ijnsec/DaiC07 fatcat:z2r4mxjoxfharbna3ctqccm2se

A Forensic Analysis of Home Automation Devices (FAHAD) Model: Kasa Smart Light Bulb and Eufy Floodlight Camera as Case Studies

Fahad E. Salamh
2021 International Journal of Cyber Forensics and Advanced Threat Investigations  
The main goal of the technical experiment in this research is to support the proposed model.  ...  The adoption of Internet of Things (IoT) devices is rapidly increasing with the advancement of network technology, these devices carry sensitive data that require adherence to minimum security practices  ...  Acknowledgments To the VTO labs for creating the IoT Forensic dataset.  ... 
doi:10.46386/ijcfati.v1i1-3.16 fatcat:s7dapo7eg5bmlpxelmaq2r3hmm

A Design and Experiment of Automation Management System for Platform as a Service

Alalaa Tashkandi
2019 Proceedings of the 2019 Federated Conference on Computer Science and Information Systems  
In this paper, PaaS automation quality and security management system (MS) layered model is proposed and validated. The aim of the MS is enabling PaaS model for mission critical platforms.  ...  Management of database systems, middleware and application runtime environments is automated in PaaS [2].  ...  Sequence of events and logs of security control and QA must be forensically sound and reliable in case of a security incident or PaaS failure [1] .  ... 
doi:10.15439/2019f82 dblp:conf/fedcsis/Tashkandi19 fatcat:hbb7xelwxrhv7iagwxqwl5f5qq

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists

Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
2021 Computers & electrical engineering  
Many domains that can benefit from novel solutions based on data analytics have stringent security requirements to fulfill.  ...  The Energy domain's Smart Grid is a major example of systems at the crossroads of security and data-driven intelligence. The Smart Grid plays a crucial role in modern energy infrastructure.  ...  Acknowledgments This work was partly supported by the European Union's Horizon 2020 research and innovation programme under the CONCORDIA: Cyber security cOmpeteNce fOr Research anD Innovation project,  ... 
doi:10.1016/j.compeleceng.2021.107215 fatcat:3g46gzlyhnff7np4d7o2ypqgqu

SafeConfig 2015

Ehab Al-Shaer, Christopher Oehmen, Mohammad Ashiqur Rahman
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
The automated decision making should be able to determine the security and resiliency of networked information systems and services.  ...  The integration of security requirements, capabilities, and deployment constraints in a unified framework will enable intelligent response, automated defense, and network resiliency.  ...  TPC Members ACKNOWLEDGMENTS We would like to thank all authors who submitted their contributions to SafeConfig'15.  ... 
doi:10.1145/2810103.2812624 dblp:conf/ccs/Al-ShaerOR15 fatcat:zjjkq5h6pjhp3j45jmggh7qvpq

Cyber Threat Intelligence from Honeypot Data Using Elasticsearch

Hamad Almohannadi, Irfan Awan, Jassim Al Hamar, Andrea Cullen, Jules Pagan Disso, Lorna Armitage
2018 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)  
Instead, it requires greater intelligence in order to fully understand an adversary's motive by analysing various types of Indicator of Compromise (IoC).  ...  To achieve this goal, we have deployed a honeypot on an AWS cloud to collect cyber incident log data.  ...  The automation requires analysis of activities of the intruders to provide better protection. In this paper, we have proposed a new threat intelligence approach.  ... 
doi:10.1109/aina.2018.00132 dblp:conf/aina/Al-MohannadiAHC18 fatcat:wtuutpp4gfayncvgpixh7y754e

AI/ML in Security Orchestration, Automation and Response: Future Research Directions

Johnson Kinyua, Lawrence Awuah
2021 Intelligent Automation and Soft Computing  
, and applications in response to security incidents to empower SOC teams.  ...  Today's cyber defense capabilities in many organizations consist of a diversity of tools, products, and solutions, which are very challenging for Security Operations Centre (SOC) teams to manage in current  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/iasc.2021.016240 fatcat:4c2dgerxwzhonn3xyypyyekmjq

IT Security Risk Management Model for Cloud Computing

Gunnar Wahlgren, Stewart Kowalski
2013 International Journal of E-Entrepreneurship and Innovation  
In this paper we concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents.  ...  We present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA´s Risk IT Framework.  ...  However in this paper we will consistently make use of the term incident. An incident is an observable change to the normal behavior of a system.  ... 
doi:10.4018/ijeei.2013100101 fatcat:jc5mgqyzx5eildjiqapvhioggm
« Previous Showing results 1 — 15 out of 17,357 results