2019
DOI: 10.1007/978-3-030-20257-6_41
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)

Abstract: This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs) by providing a dynamic collaborative, warning and response system (CyberSANE system) supporting and guiding security officers and operators (e.g. Incident Response professionals) to recognize, identify, dynamically analyse, forecast, treat and respond to their threats and risks and handle their daily cyber incidents. The proposed solution provides a first of a kind approach for handling cyber security incident… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…As a result, to minimize further losses, businesses must create and implement a comprehensive cybersecurity strategy. The most recent socioeconomic studies show that [11] the nation's security is dependent on governments, people with access to data, applications and tools that require high security clearance.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, to minimize further losses, businesses must create and implement a comprehensive cybersecurity strategy. The most recent socioeconomic studies show that [11] the nation's security is dependent on governments, people with access to data, applications and tools that require high security clearance.…”
Section: Introductionmentioning
confidence: 99%
“…For example, social engineering or phishing ( Kushwaha, Buckchash & Raman, 2017 ), zero-day attack ( Jyothsna & Prasad, 2019 ), malware attack ( McIntosh et al, 2019 ), denial of service (DoS) ( Verma & Ranga, 2020 ), unauthorized access of confidential and valuable resources ( Saleh, Talaat & Labib, 2019 ). Additionally, according to the authors of Papastergiou, Mouratidis & Kalogeraki (2020) , a nation’s competitive edge in the global market and national security is currently driven by harnessing these efficient, productive, and highly secure leading-edge technologies with intelligent and dynamic means of timely detection and prevention of cyberattacks. Nevertheless, irrespective of the tireless efforts of security experts in defense mechanisms, hackers have always found ways to get away with targeted resources from valuable and most trusted sources worldwide by launching versatile, sophisticated, and automated cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, companies should implement and create a robust cybersecurity strategy to prevent such losses. According to a recent sociological study, the nation's future is contingent on the government's public with information access programs and high-security equipment [11], 0 billion per year [9]. The intelligence community anticipates that the number of records broken will triple over the following 5 years [10].…”
Section: Introductionmentioning
confidence: 99%
“…As an outcome, businesses should implement and create an effective security strategy to prevent such losses. The nation's upcoming is dependent on the government, persons with the right to use high-security equipment, and knowledge programmes, according to a recent sociological study [11]. Additionally, it depends on companies granting access to their staff members, who are capable of and knowledgeable about recognizing such cyber threats immediately and efficiently.…”
Section: Introductionmentioning
confidence: 99%