Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations

Tilahun Ayalew Tareke, Sujoy Datta
{"title":"Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations","authors":"Tilahun Ayalew Tareke, Sujoy Datta","doi":"10.1109/ICCMC.2018.8487245","DOIUrl":null,"url":null,"abstract":"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"40 1","pages":"533-538"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
选定机构/组织的自动化和云网络安全改进
自动化和云网络安全的进步彻底改变了网络犯罪检测和补救方法的方式。如今,即使是在秒、微秒和纳秒等时间单位的一小部分,技术进步也在增加。然而,网络攻击与试图通过网络空间访问未经授权的资源同时存在挑战。很明显,网络攻击者的性质随着时间的推移而变化,以在国家和国际层面上执行已经设计好的网络安全部门政策、程序和法律框架。因此,必须设计和开发自动化的云网络安全,以确保预先保护试图渗透任何系统的网络攻击者的动态特性。因此,本文的目的是由司法机构根据规定的网络法律检测、监控、处理、预测和调查,并将充分的证据存储在所有物理和云服务器中,并与选定的工业、商业组织、教育机构和政府机构/组织合作。网络攻击者行为的程度,包括基础设施缺陷、算法修改和恶意代码泛滥,覆盖行业、机构和其他目标组织的关键来源。现在,这项技术应该以一种形式用于加强防御技术,并通过引入自动化、云支持和改进的网络安全系统来解决网络犯罪。这是通过设计和部署一个预测性的、自动化的、动态的、支持云的集成系统来实现的,该集成系统将最终用户设备作为最终来源。在选定的机构/组织中改进网络安全,解决网络攻击者行为的存储和检索,最终用户最终来源的实施,网络安全部门与目标机构之间的通信,同时检测网络攻击者和法律刑事调查流程。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modelling of Audio Effects for Vocal and Music Synthesis in Real Time Deep Learning Framework for Diabetic Retinopathy Diagnosis A Comprehensive Survey on Internet of Things Based Healthcare Services and its Applications Exploring Pain Insensitivity Inducing Gene ZFHX2 by using Deep Convolutional Neural Network Atmospheric Weather Prediction Using various machine learning Techniques: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1