This paper aims to present new strategies of maintaining security that are powered by the (big) data. In its first part, the paper introduces the general idea of the big data analysis being used to empower security while stating obvious lack of progress in the data protection legislation. In its second part, the paper presents standard perimeter-based security and cyber security and, based on the available literature, states that it disproportionately enhances risks for computer systems. In its third part, the paper provides an overview of the intelligence-driven security, which is largely understood by the industry as the only way to maintain security facing advanced persistent threats. The last part briefly discusses possible outcome of f...
Companies and individuals are becoming more dependant on technology, automated processes, the Intern...
This open access book describes the technologies needed to construct a secure big data infrastructur...
The effectiveness of modern computer applications is normally regarded as a function of five basic a...
This paper deals with information security and safety issues in public open spaces. Public open spac...
The traditional activity of searching for one or more information online has turned into the use of ...
In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is...
The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security ...
We have witnessed huge values of the big data in the last decade, and it is evidential that the data...
This perspective paper discusses challenges and risks of the information age, and the implications f...
Big data, a recently popular term that refers to a massive collection of very large and complex data...
Big information is expounded to technologies for assembling, processing, analyzing and extracting he...
In the context of the information age, computer network technology continues to innovate and plays a...
The paper recalls the process which led to the adoption of the new european Data Protection Regulati...
The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espion...
Global information and communications technologies create criminal opportunities in which criminal v...
Companies and individuals are becoming more dependant on technology, automated processes, the Intern...
This open access book describes the technologies needed to construct a secure big data infrastructur...
The effectiveness of modern computer applications is normally regarded as a function of five basic a...
This paper deals with information security and safety issues in public open spaces. Public open spac...
The traditional activity of searching for one or more information online has turned into the use of ...
In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is...
The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security ...
We have witnessed huge values of the big data in the last decade, and it is evidential that the data...
This perspective paper discusses challenges and risks of the information age, and the implications f...
Big data, a recently popular term that refers to a massive collection of very large and complex data...
Big information is expounded to technologies for assembling, processing, analyzing and extracting he...
In the context of the information age, computer network technology continues to innovate and plays a...
The paper recalls the process which led to the adoption of the new european Data Protection Regulati...
The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espion...
Global information and communications technologies create criminal opportunities in which criminal v...
Companies and individuals are becoming more dependant on technology, automated processes, the Intern...
This open access book describes the technologies needed to construct a secure big data infrastructur...
The effectiveness of modern computer applications is normally regarded as a function of five basic a...