Essays about: "Enterprise Security Architecture"

Showing result 1 - 5 of 23 essays containing the words Enterprise Security Architecture.

  1. 1. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  2. 2. Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture

    University essay from Högskolan i Halmstad

    Author : Jonas Henriksson; [2021]
    Keywords : Digital Forensic; Mutual Legal Assistance; Enterprise Architecture; System of Systems; Incident Command System; Fusion Center; Semantic Network; GraphQL; React; Cloud; Graph Database; Apollo; REST; Security;

    Abstract : Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. READ MORE

  3. 3. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamid Noroozi; [2021]
    Keywords : Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Microservice; Container Orchestration; Cloud; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.;

    Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE

  4. 4. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Wierzbieniec; [2018]
    Keywords : Security Monitoring; SIEM; Log Management; SOC; Threat Intelligence; Security Analytics;

    Abstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE

  5. 5. Patch Delivery Infrastructure in SCADA Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svetlomir Petrov; [2018]
    Keywords : ;

    Abstract : As other technologies, the SCADA architecture, whose origin can be traced back to midtwentiethcentury, was not designed initially with security in mind. Recent cyber-attacks andsecurity incidents show that approaches like security through obscurity and air-gapping thesystems are not relevant anymore. READ MORE