Incidence Handling and Response System

IJCSIS June 2009 Issue, Vol. 2, No. 1 A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kalbande, Prof. Dhananjay R, Thampi, Dr. G. T, Singh, Mr. Manish
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Kalbande, Prof. Dhananjay R
Thampi, Dr. G. T
Singh, Mr. Manish
description IJCSIS June 2009 Issue, Vol. 2, No. 1 A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. Incidence response has always been an important aspect of information security but it is often overlooked by security administrators. in this paper, we propose an automated system which will handle the security threats and make the computer network capable enough to withstand any kind of attack. we also present the state-of-the-art technology in computer, network and software which is required to build such a system.
doi_str_mv 10.48550/arxiv.0906.5060
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_0906_5060</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>0906_5060</sourcerecordid><originalsourceid>FETCH-LOGICAL-a650-b1b9fb07ecf772b5d2754343b9a317365ec0154dd08ccf07a5f239ad8ca94c543</originalsourceid><addsrcrecordid>eNotzjsLwjAUhuEsDqLuTtLJrfW0yWmaUcQbCIK6l5ObFNoorYj-e6_Tu3x8PIyNU0hEgQgzah_VPQEFeYKQQ59Nt8FU1gXjog0FW1fhHL0bHVx3vYTORcdnd3PNkPU81Z0b_Ttgp9XytNjEu_16u5jvYsoRYp1q5TVIZ7yUmUabSRRccK2Ip5Ln6AykKKyFwhgPktBnXJEtDClh3tMBm_xuv87y2lYNtc_y4y0_Xv4CyKA5lQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Incidence Handling and Response System</title><source>arXiv.org</source><creator>Kalbande, Prof. Dhananjay R ; Thampi, Dr. G. T ; Singh, Mr. Manish</creator><creatorcontrib>Kalbande, Prof. Dhananjay R ; Thampi, Dr. G. T ; Singh, Mr. Manish</creatorcontrib><description>IJCSIS June 2009 Issue, Vol. 2, No. 1 A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. Incidence response has always been an important aspect of information security but it is often overlooked by security administrators. in this paper, we propose an automated system which will handle the security threats and make the computer network capable enough to withstand any kind of attack. we also present the state-of-the-art technology in computer, network and software which is required to build such a system.</description><identifier>DOI: 10.48550/arxiv.0906.5060</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2009-06</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/0906.5060$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.0906.5060$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kalbande, Prof. Dhananjay R</creatorcontrib><creatorcontrib>Thampi, Dr. G. T</creatorcontrib><creatorcontrib>Singh, Mr. Manish</creatorcontrib><title>Incidence Handling and Response System</title><description>IJCSIS June 2009 Issue, Vol. 2, No. 1 A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. Incidence response has always been an important aspect of information security but it is often overlooked by security administrators. in this paper, we propose an automated system which will handle the security threats and make the computer network capable enough to withstand any kind of attack. we also present the state-of-the-art technology in computer, network and software which is required to build such a system.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzjsLwjAUhuEsDqLuTtLJrfW0yWmaUcQbCIK6l5ObFNoorYj-e6_Tu3x8PIyNU0hEgQgzah_VPQEFeYKQQ59Nt8FU1gXjog0FW1fhHL0bHVx3vYTORcdnd3PNkPU81Z0b_Ttgp9XytNjEu_16u5jvYsoRYp1q5TVIZ7yUmUabSRRccK2Ip5Ln6AykKKyFwhgPktBnXJEtDClh3tMBm_xuv87y2lYNtc_y4y0_Xv4CyKA5lQ</recordid><startdate>20090627</startdate><enddate>20090627</enddate><creator>Kalbande, Prof. Dhananjay R</creator><creator>Thampi, Dr. G. T</creator><creator>Singh, Mr. Manish</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20090627</creationdate><title>Incidence Handling and Response System</title><author>Kalbande, Prof. Dhananjay R ; Thampi, Dr. G. T ; Singh, Mr. Manish</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a650-b1b9fb07ecf772b5d2754343b9a317365ec0154dd08ccf07a5f239ad8ca94c543</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kalbande, Prof. Dhananjay R</creatorcontrib><creatorcontrib>Thampi, Dr. G. T</creatorcontrib><creatorcontrib>Singh, Mr. Manish</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kalbande, Prof. Dhananjay R</au><au>Thampi, Dr. G. T</au><au>Singh, Mr. Manish</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Incidence Handling and Response System</atitle><date>2009-06-27</date><risdate>2009</risdate><abstract>IJCSIS June 2009 Issue, Vol. 2, No. 1 A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. Incidence response has always been an important aspect of information security but it is often overlooked by security administrators. in this paper, we propose an automated system which will handle the security threats and make the computer network capable enough to withstand any kind of attack. we also present the state-of-the-art technology in computer, network and software which is required to build such a system.</abstract><doi>10.48550/arxiv.0906.5060</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.0906.5060
ispartof
issn
language eng
recordid cdi_arxiv_primary_0906_5060
source arXiv.org
subjects Computer Science - Cryptography and Security
title Incidence Handling and Response System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T18%3A45%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Incidence%20Handling%20and%20Response%20System&rft.au=Kalbande,%20Prof.%20Dhananjay%20R&rft.date=2009-06-27&rft_id=info:doi/10.48550/arxiv.0906.5060&rft_dat=%3Carxiv_GOX%3E0906_5060%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true