Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468 - 09 September 2021

    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study More >

  • Open Access

    ARTICLE

    AI/ML in Security Orchestration, Automation and Response: Future Research Directions

    Johnson Kinyua1, Lawrence Awuah2,*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 527-545, 2021, DOI:10.32604/iasc.2021.016240 - 01 April 2021

    Abstract Today’s cyber defense capabilities in many organizations consist of a diversity of tools, products, and solutions, which are very challenging for Security Operations Centre (SOC) teams to manage in current advanced and dynamic cyber threat environments. Security researchers and industry practitioners have proposed security orchestration, automation, and response (SOAR) solutions designed to integrate and automate the disparate security tasks, processes, and applications in response to security incidents to empower SOC teams. The next big step for cyber threat detection, mitigation, and prevention efforts is to leverage AI/ML in SOAR solutions. AI/ML will act as a More >

Displaying 1-10 on page 1 of 2. Per Page