Result oriented time correlation between security and risk assessments, and individual environment compliance framework

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security professionals and attackers have common approach on their daily work. Hackers are following the same rule set as the data protectors while seeking for potential vulnerabilities to be exploited. Security assessments are usually deployed on year or mid-year basis. A prepared attacker would need 2 days to take down the environment once it is breached, or to remain unnoticed for more than 6 months. The discrepancies in those two timelines of activities performed on both sides could bring significant implications for any organization. The aim of this article is to suggest an approach for creation of an automated daily security assessment.

Cite

CITATION STYLE

APA

Dimov, D., & Tsonev, Y. (2019). Result oriented time correlation between security and risk assessments, and individual environment compliance framework. In Smart Innovation, Systems and Technologies (Vol. 111, pp. 373–383). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03577-8_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free