Advertisement

Result Oriented Time Correlation Between Security and Risk Assessments, and Individual Environment Compliance Framework

  • Dimo Dimov
  • Yuliyan Tsonev
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 111)

Abstract

Security professionals and attackers have common approach on their daily work. Hackers are following the same rule set as the data protectors while seeking for potential vulnerabilities to be exploited. Security assessments are usually deployed on year or mid-year basis. A prepared attacker would need 2 days to take down the environment once it is breached, or to remain unnoticed for more than 6 months. The discrepancies in those two timelines of activities performed on both sides could bring significant implications for any organization. The aim of this article is to suggest an approach for creation of an automated daily security assessment.

Keywords

Security assessment Automated reporting PowerShell Information security Event forwarding 

References

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information TechnologiesNikola Vaptsarov Naval AcademyVarnaBulgaria

Personalised recommendations