Back to Search
Start Over
METHODS OF IDENTIFYING VULNERABILITIES IN THE INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS.
- Source :
- Romanian Military Thinking; 2023, Issue 1, p126-145, 20p
- Publication Year :
- 2023
-
Abstract
- The application of tools and methods to improve the effectiveness of the information security management system by detecting and neutralizing cyber attacks, monitoring and blocking DDoS attacks, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), blocking TOR Exit Nodes, blocking Layer 7 Regular Expression attacks, web filtering, blocking malware attacks, ransomware, spammers and spam servers has become a sine-qua-non requirement in the management of information security incidents in order to minimize their impact on IT systems. The paper provides insight into the impact of integrating much-needed security requirements for information technology users in military systems. The collection of information was carried out on a statistical sample of 128 students from military academies in Romania, Bulgaria, Poland. The research methods are complemented by cross-sectional (questionnaire, survey, observation) and observational methods. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 18414451
- Issue :
- 1
- Database :
- Complementary Index
- Journal :
- Romanian Military Thinking
- Publication Type :
- Academic Journal
- Accession number :
- 163029868
- Full Text :
- https://doi.org/10.55535/RMT.2023.1.7