[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Heikkinen, 2018 - Google Patents

Information Security Case Study with Security Onion at Kajaani UAS Datacentre Laboratory

Heikkinen, 2018

View PDF
Document ID
13268316238240444595
Author
Heikkinen R
Publication year

External Links

Snippet

This graduation thesis' goal was to evaluate and improve the information security stance of the Datacentre Laboratory of Kajaani University of Applied Science which hosts its own datacentre for student governed administration to facilitate teaching and project work. This …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
US12166785B2 (en) Systems and methods for predictive analysis of potential attack patterns based on contextual security information
Scarfone et al. Guide to intrusion detection and prevention systems (idps)
US10230750B2 (en) Secure computing environment
Caswell et al. Snort intrusion detection and prevention toolkit
US12149555B2 (en) Systems and methods for vulnerability assessment for cloud assets using imaging methods
US20230205891A1 (en) Systems and methods for prioritizing security findings using machine learning models
Irfan et al. A framework for cloud forensics evidence collection and analysis using security information and event management
Scarfone et al. Sp 800-94. guide to intrusion detection and prevention systems (idps)
US20240314169A1 (en) Systems and methods for cloud-based threat alerts and monitoring
Belmonte Martin et al. Threat landscape and good practice guide for software defined networks/5g
Fry et al. Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
Naagas et al. A threat-driven approach to modeling a campus network security
Trisolino Analysis of Security Configuration for IDS/IPS
Mejri et al. Cloud security issues and log-based proactive strategy
Heikkinen Information Security Case Study with Security Onion at Kajaani UAS Datacentre Laboratory
Yadav et al. A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security
Karie et al. Cybersecurity Incident Response in the Enterprise
Weiss et al. CompTIA Security+ SY0-601 Exam Cram
Shamma Implementing CIS critical security controls for organizations on a low-budget
Ackerman Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization
Delgado Developing an adaptive threat hunting solution: The elasticsearch stack
Seidl CompTIA Security+ Practice Tests: Exam SY0-601
Sarıkoz An Information security framework for web services in enterprise networks
Hajdarevic Cyber Security Audit in Business Environments
Perwaiz Critical Infrastructure Protection: Modeling Utility Network Security