Back to Search Start Over

METHODS OF IDENTIFYING VULNERABILITIES IN THE INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS.

Authors :
CÂRSTEA, Claudia
Source :
Romanian Military Thinking; 2023, Issue 1, p126-145, 20p
Publication Year :
2023

Abstract

The application of tools and methods to improve the effectiveness of the information security management system by detecting and neutralizing cyber attacks, monitoring and blocking DDoS attacks, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), blocking TOR Exit Nodes, blocking Layer 7 Regular Expression attacks, web filtering, blocking malware attacks, ransomware, spammers and spam servers has become a sine-qua-non requirement in the management of information security incidents in order to minimize their impact on IT systems. The paper provides insight into the impact of integrating much-needed security requirements for information technology users in military systems. The collection of information was carried out on a statistical sample of 128 students from military academies in Romania, Bulgaria, Poland. The research methods are complemented by cross-sectional (questionnaire, survey, observation) and observational methods. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
18414451
Issue :
1
Database :
Complementary Index
Journal :
Romanian Military Thinking
Publication Type :
Academic Journal
Accession number :
163029868
Full Text :
https://doi.org/10.55535/RMT.2023.1.7