{"title":"选定机构/组织的自动化和云网络安全改进","authors":"Tilahun Ayalew Tareke, Sujoy Datta","doi":"10.1109/ICCMC.2018.8487245","DOIUrl":null,"url":null,"abstract":"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"40 1","pages":"533-538"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations\",\"authors\":\"Tilahun Ayalew Tareke, Sujoy Datta\",\"doi\":\"10.1109/ICCMC.2018.8487245\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.\",\"PeriodicalId\":6604,\"journal\":{\"name\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"40 1\",\"pages\":\"533-538\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2018.8487245\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations
Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.