Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Information Security Management in University Campus Using Cognitive Security
Roberto Omar Andrade, Susana Cadena, Luis Tello-Oquendo, Iván Ortiz Garcés, Walter Fuertes, Alyssa Cadena, Daniela Córdova, María Fernanda Cazares
Pages - 124 - 134 | Revised - 30-06-2019 | Published - 01-08-2019
MORE INFORMATION
KEYWORDS
Security Operation Center, Cognitive Security, Big Data, Incident Response Team.
ABSTRACT
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
A. Shameli-Sendi and M. Dagenais, "Arito: Cyber-attack response system using accurate risk impact tolerance," International Journal of Information Security, vol. 13, no. 4, pp. 367-390, Aug 2014. [Online]. Available: https://doi.org/10.1007/s10207-013-0222-9. | |
A. Shameli-Sendi, H. Louafi, W. He, and M. Cheriet, "Dynamic optimal countermeasure selection for intrusion response system," IEEE Trans. on Dep. and Sec. Comp., vol. 15, no. 5, pp. 755-770, Oct 2018. | |
Andrade, R., Torres, J., & Flores, P. (2018). Management of information security indicators under a cognitive security model. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). doi:10.1109/ccwc.2018.8301745. | |
B. Collis and M. van der Wende, "Models of technology and change in higher education: an international comparative survey on the current and future use of ICT in higher education". Netherlands: Center for Higher Education Policy Studies (CHEPS), 2002. | |
BBC News. (2019). Students blamed for college cyber-attacks. [online] Available at: https://www.bbc.com/news/education-45496714 [Accessed 27 Jul. 2019]. | |
C. Holsapple, "Dss architecture and types", Decis. Support Syst., vol. 1, pp. 163-189, 01 2008. | |
C. Mu and Y. Li, "An intrusion response decision-making model based on hierarchical task network planning," Expert Systems with Applications, vol. 37, pp. 2465-2472, 03 2010. | |
Cadena, A., Gualoto, F., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F., & Torres, J. (2019). Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. Developments and Advances in Defense and Security, 507-519. doi:10.1007/978-981-13-9155-2_40. | |
K. Moller, "Setting up a grid-cert: experiences of an academic CSIRT" in Campus-Wide Information Systems, vol. 24, no. 4, 2007, pp. 260-270. | |
S. Berenjian, M. Shajari, N. Farshid, and M. Hatamian, "Intelligent automated intrusion response system based on fuzzy decision making and risk assessment," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), Sept 2016, pp. 709-714. | |
S. Iannucci and S. Abdelwahed, "Model-based response planning strategies for autonomic intrusion protection," ACM Trans. Auton. Adapt. Syst., vol. 13, no. 1, pp. 4:1-4:23, Apr. 2018. [Online]. Available: http://doi.acm.org/10.1145/3168446. | |
Tello-Oquendo, L.; Tapia, F.; Fuertes, W.; Andrade, R.; Erazo, N.; Torres, J. and Cadena, A. (2019). A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy.In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-372-8, pages 328-336. DOI: 10.5220/0007753503280336. | |
V. M. Lanchas, V. A. V. Gonzalez, and F. R. Bueno, "Ontologies-based automated intrusion response system," in Computational Intelligence in Security for Information Systems 2010, 2010, pp. 99-106. | |
Mr. Roberto Omar Andrade
Escuela Politécnica Nacional, Quito, Ecuador - Ecuador
roberto.andrade@epn.edu.ec
Mrs. Susana Cadena
Universidad Central del Ecuador, Quito, Ecuador - Ecuador
Mr. Luis Tello-Oquendo
Universidad Nacional de Chimborazo, Riobamba, Ecuador - Ecuador
Mr. Iván Ortiz Garcés
Universidad de las Américas, Quito, Ecuador - Ecuador
Mr. Walter Fuertes
Universidad de las Fuerzas Armadas ESPE
Quito, Ecuador Sangolquí, Ecuador - Ecuador
Miss Alyssa Cadena
Escuela Politécnica del Ejército, Sangolquí, Ecuador - Ecuador
Ms. Daniela Córdova
Escuela Politécnica Nacional, Quito, Ecuador - Ecuador
Ms. María Fernanda Cazares
Universidad Politécnica Salesiana, Quito, Ecuador - Ecuador
|
|
|
|
View all special issues >> | |
|
|