2019 International Workshop on Big Data and Information Security (IWBIS) 2019
DOI: 10.1109/iwbis.2019.8935723
|View full text |Cite
|
Sign up to set email alerts
|

Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The model design of cyber security is constructed on integral, confidential, and available information [25]. The purpose of cyber security is to protect cyber space such as personal information, e-government data, e-marketing websites, e-business reports, and various applications from unauthorized penetration [26]. In addition, it covers the security of software and equipment that ensure and guarantee the privacy and integrity of the data under protection from a variety of threats and attacks [27].…”
Section: Cyber Securitymentioning
confidence: 99%
“…The model design of cyber security is constructed on integral, confidential, and available information [25]. The purpose of cyber security is to protect cyber space such as personal information, e-government data, e-marketing websites, e-business reports, and various applications from unauthorized penetration [26]. In addition, it covers the security of software and equipment that ensure and guarantee the privacy and integrity of the data under protection from a variety of threats and attacks [27].…”
Section: Cyber Securitymentioning
confidence: 99%
“…cyber-attacks detection methods. The authors of [25] presented a cyber-security tools for detecting and minimizing the effects of attacks in Korean government. These tools had the ability in doing training in terms of cyber-security issues that can face cloud based web applications.…”
Section: Introductionmentioning
confidence: 99%
“…In this context, computer security has become a major challenge, and work in this area of research is increasing. Various tools and mechanisms are developed to ensure a level of safety that meets the demands of modern life [1]. These tools include the Intrusion Detection System (IDS).…”
Section: Introductionmentioning
confidence: 99%