Heikkinen, 2018 - Google Patents
Information Security Case Study with Security Onion at Kajaani UAS Datacentre LaboratoryHeikkinen, 2018
View PDF- Document ID
- 13268316238240444595
- Author
- Heikkinen R
- Publication year
External Links
Snippet
This graduation thesis' goal was to evaluate and improve the information security stance of the Datacentre Laboratory of Kajaani University of Applied Science which hosts its own datacentre for student governed administration to facilitate teaching and project work. This …
- 240000002840 Allium cepa 0 title description 158
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12166785B2 (en) | Systems and methods for predictive analysis of potential attack patterns based on contextual security information | |
Scarfone et al. | Guide to intrusion detection and prevention systems (idps) | |
US10230750B2 (en) | Secure computing environment | |
Caswell et al. | Snort intrusion detection and prevention toolkit | |
US12149555B2 (en) | Systems and methods for vulnerability assessment for cloud assets using imaging methods | |
US20230205891A1 (en) | Systems and methods for prioritizing security findings using machine learning models | |
Irfan et al. | A framework for cloud forensics evidence collection and analysis using security information and event management | |
Scarfone et al. | Sp 800-94. guide to intrusion detection and prevention systems (idps) | |
US20240314169A1 (en) | Systems and methods for cloud-based threat alerts and monitoring | |
Belmonte Martin et al. | Threat landscape and good practice guide for software defined networks/5g | |
Fry et al. | Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks | |
Naagas et al. | A threat-driven approach to modeling a campus network security | |
Trisolino | Analysis of Security Configuration for IDS/IPS | |
Mejri et al. | Cloud security issues and log-based proactive strategy | |
Heikkinen | Information Security Case Study with Security Onion at Kajaani UAS Datacentre Laboratory | |
Yadav et al. | A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security | |
Karie et al. | Cybersecurity Incident Response in the Enterprise | |
Weiss et al. | CompTIA Security+ SY0-601 Exam Cram | |
Shamma | Implementing CIS critical security controls for organizations on a low-budget | |
Ackerman | Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization | |
Delgado | Developing an adaptive threat hunting solution: The elasticsearch stack | |
Seidl | CompTIA Security+ Practice Tests: Exam SY0-601 | |
Sarıkoz | An Information security framework for web services in enterprise networks | |
Hajdarevic | Cyber Security Audit in Business Environments | |
Perwaiz | Critical Infrastructure Protection: Modeling Utility Network Security |