2021
DOI: 10.52547/jist.9.33.67
|View full text |Cite
|
Sign up to set email alerts
|

Secured Access Control in Security Information and Event Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…While the data contained in RFID tags are already secured with key security, using a Secure Access Module (SAM) device for security would be an even better approach [39], [40].…”
Section: B Discussionmentioning
confidence: 99%
“…While the data contained in RFID tags are already secured with key security, using a Secure Access Module (SAM) device for security would be an even better approach [39], [40].…”
Section: B Discussionmentioning
confidence: 99%
“…ere is a need for pervasive visibility and deep insights into the application, devices, packets, processes, network flows, and workload communications within an MEC environment. Correlating logs and data analytics in the MEC environment would enable the identification of anomalies across the MEC ecosystem [38]. Security analysts should be able to monitor the threat landscape in real time, triage security incidents, and apply intelligent security controls.…”
Section: Securementioning
confidence: 99%
“…e MEC operator must monitor, manage, and control the security posture using policies based on a predetermined security baseline. MEC operators can determine if the UE can still be trusted and deemed compliant by interrogating the UE posture using Network Access Control (NAC) [38] with serial device profiling. A Unified Endpoint Management (UEM) [44] solution may enable a MEC operator to manage, monitor, and control all devices, that is, UE, nodes, and IoT across all MEC functional layers.…”
Section: Securing the Trust Pillarsmentioning
confidence: 99%
“…SIEM solutions have evolved into comprehensive systems that offer extensive visibility, enabling the identification of high-risk areas and proactive mitigation strategies to minimize costs and incident response time [16]. Furthermore, in [17], the authors assert that SIEM enables the storage and monitoring of unwanted events and unauthorized access to computer system records, which can lead to various security threats, including information leakage and breaches of privacy and confidentiality.…”
Section: Introductionmentioning
confidence: 99%