In a rapidly changing cyber threat landscape it has become a challenging task for organisations defend against sophisticated cyber-attacks. With new regulations such as GDPR (General Data Protection Regulation) in effect, organizations had to make sure they maintain adequate measures and security controls in place. This research paper is focused on how to utilize the ability of security operations centre (SOC) effectively with the implementation of behavioural based threat model to detect the presence of adversaries in the network by identifying their behaviour. This threat model’s objective goal is to save organisations from huge amount of fine and reputation loss due to cyberattacks by APTs
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophi...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...
With the increased sophistication of tools and techniques deployed by cybercriminals, traditional me...
Identification of threats to organisations and risk assessment often take into consideration the pur...
Today, businesses observe change in priorities, and data intelligence becomes one of the key drivers...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
Managing critical infrastructures under the growing cyber-threat is becoming a matter of internation...
Previous research have found that organisations lack structured approaches for learning from inciden...
In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophi...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...
With the increased sophistication of tools and techniques deployed by cybercriminals, traditional me...
Identification of threats to organisations and risk assessment often take into consideration the pur...
Today, businesses observe change in priorities, and data intelligence becomes one of the key drivers...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
Managing critical infrastructures under the growing cyber-threat is becoming a matter of internation...
Previous research have found that organisations lack structured approaches for learning from inciden...
In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophi...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...