Alenezi, Khalid and Alshaikhli, Imad Fakhri Taha and Abdullah, Lili Marziana and AlAhmad, Mohammad A. (2015) CERT Technologies. International Journal of Innovation in Science and Mathematics, 3 (6). pp. 275-282. ISSN 2347–9051
PDF
Restricted to Repository staff only Download (409kB) | Request a copy |
Abstract
Members of the incident response team should have excellent technical skills, such as system administration, network administration, programming, technical support, malware analysis, and intrusion detection. Moreover, supporting system state and status reporting are associated with enabling automated mechanisms with the hardware or software that report information about the system, including abnormal behavior, intrusion attempts, or any other data that would be useful in detecting an incident, understanding impact, and quickly supporting resolution. In order to effectively protect GE and Non-GE entities from cyber-attacks, multiple layers of defenses strategies are needed to combat multiple security issues. The strategy is based on using appropriate security countermeasures across operational, network, and host functionality of GE and Non- GE entities. Therefore, we proposed four zones segment information architecture for securing the main assets and services of GE and Non-GE entities in Kuwait. In each of these zones specific and unique security focus are addressed. For each zone of the layered cyber-security systems architecture, technological security elements are presented to help in securing IT assets and services of the organizations. Such a layered cyber-security systems architecture will assist the organizations in creating clear boundaries in order to effectively and practically apply multiple layers of defenses.
Item Type: | Article (Journal) |
---|---|
Additional Information: | 6534/45854 |
Uncontrolled Keywords: | CERT |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Professor Imad Taha |
Date Deposited: | 25 Nov 2015 08:12 |
Last Modified: | 17 May 2017 12:10 |
URI: | http://irep.iium.edu.my/id/eprint/45854 |
Actions (login required)
View Item |