*Five Years Citation in Google scholar (2016 - 2020) is. 1451*   *    IJPR IS INDEXED IN ELSEVIER EMBASE & EBSCO *       

logo

INTERNATIONAL JOURNAL OF PHARMACEUTICAL RESEARCH

A Step Towards Excellence
Published by : Advanced Scientific Research
ISSN
0975-2366
Current Issue
Article In Press
No Data found.
ADOBE READER

(Require Adobe Acrobat Reader to open, If you don't have Adobe Acrobat Reader)

Index Page 1
Click here to Download
IJPR 9[3] July - September 2017 Special Issue

July - September 9[3] 2017

Click to download
 

Article Detail

Label
Label
Cost Effective Security Information & Event Management (SIEM) for Small and Medium-Sized Enterprises

Author: ALI ELGENEIDY, NOR AZLINA ABD RAHMAN, JULIA JUREMI
Abstract: Cyber security threats are increasing manifold, largely respective to the size of the organization. To defend against such threats, an organization must acquire proper security threat detection and incident handling capabilities. The vast majority of small & medium-sized enterprises lack a Security Information & Event Management (SIEM), which serves as the heart of a proper threat detection& incident handling process. The main cause for such lack is the constrains of cost in enterprises of such size, leaving them prone and vulnerable to advanced cyber threats more than ever by reverting to legacy security measures (e.g. port-based firewalls & signature-based IPS) for protection against the expanding cyber threat landscape. Therefore, a modular SIEM system is proposed aiming at enhancing the security of small & medium sized enterprises at no cost by utilizing open-source modules, bringing modern security to the organization, allowing it to stand a better chance at securing and defending its portion of cyberspace. The proposed SIEM system demonstrates rapid data collection, analytics, & visualization lending itself to aiding the organization in responsively and proactively monitoring and analyzing threats and incidents, while providing vulnerability management & host monitoring capabilities.
Keyword: Host Monitoring, Intrusion Detection, Network Monitoring, Network Security, Security Information & Event Management, Threat Detection, Vulnerability Assessment
DOI: https://doi.org/10.31838/ijpr/2020.12.02.0134
Download: Request For Article
 




ONLINE SUBMISSION
USER LOGIN
Username
Password
Login | Register
News & Events
SCImago Journal & Country Rank

Terms and Conditions
Disclaimer
Refund Policy
Instrucations for Subscribers
Privacy Policy

Copyrights Form

0.12
2018CiteScore
 
8th percentile
Powered by  Scopus
Google Scholar

hit counters free