[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Buecker et al., 2010 - Google Patents

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

Buecker et al., 2010

View HTML
Document ID
9731590116441953975
Author
Buecker A
Amado J
Druker D
Lorenz C
Muehlenbrock F
Tan R
et al.
Publication year

External Links

Snippet

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of …
Continue reading at books.google.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
CN107835982B (en) Method and apparatus for managing security in a computer network
Kent et al. Guide to Computer Security Log Management:.
US20070180490A1 (en) System and method for policy management
US20060191007A1 (en) Security force automation
Badger et al. US government cloud computing technology roadmap
Martseniuk et al. Automated Conformity Verification Concept for Cloud Security
Buecker et al. IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
US11895121B1 (en) Efficient identification and remediation of excessive privileges of identity and access management roles and policies
Sahin Cloud ERP security: guidelines for evaluation
Buecker et al. Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Buecker et al. IBM security solutions architecture for network, server and endpoint
Kent et al. Sp 800-92. guide to computer security log management
Stone et al. IT Asset Management
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
WO2004104793A2 (en) System and method for entreprise security monitoring and configuration management
Karlzén An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis
Copeland et al. Cloud Defense Strategies with Azure Sentinel
Haber et al. Privileged Access Management (PAM)
US11822916B2 (en) Correlation engine for detecting security vulnerabilities in continuous integration/continuous delivery pipelines
Parvanov et al. Threat modelling and vulnerability assessment for IoT solutions: a case study
Pöhn et al. Towards Improving Identity and Access Management with the IdMSecMan Process Framework
AlNaaji Automating unauthorized access attempts detection and handling using robotic process automation
Udayakumar Design and Deploy an Identify Solution
Pidlubnyi Increasing Security and reducing risks running services in a potential containerized environment while meeting regulatory standards
Τσάβος Risk assessment and risk management in a cloud based company