CERT Technologies

Members of the incident response team should have excellent technical skills, such as system administration, network administration, programming, technical support, malware analysis, and intrusion detection. Moreover, supporting system state and status reporting are associated with enabling aut...

Full description

Saved in:
Bibliographic Details
Main Authors: Alenezi, Khalid, Alshaikhli, Imad Fakhri Taha, Abdullah, Lili Marziana, AlAhmad, Mohammad A.
Format: Article
Language:English
Published: IJISM 2015
Subjects:
Online Access:http://irep.iium.edu.my/45854/1/IJISM_472.pdf
http://irep.iium.edu.my/45854/
http://www.ijism.org/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.45854
record_format dspace
spelling my.iium.irep.458542017-05-17T04:10:18Z http://irep.iium.edu.my/45854/ CERT Technologies Alenezi, Khalid Alshaikhli, Imad Fakhri Taha Abdullah, Lili Marziana AlAhmad, Mohammad A. QA75 Electronic computers. Computer science Members of the incident response team should have excellent technical skills, such as system administration, network administration, programming, technical support, malware analysis, and intrusion detection. Moreover, supporting system state and status reporting are associated with enabling automated mechanisms with the hardware or software that report information about the system, including abnormal behavior, intrusion attempts, or any other data that would be useful in detecting an incident, understanding impact, and quickly supporting resolution. In order to effectively protect GE and Non-GE entities from cyber-attacks, multiple layers of defenses strategies are needed to combat multiple security issues. The strategy is based on using appropriate security countermeasures across operational, network, and host functionality of GE and Non- GE entities. Therefore, we proposed four zones segment information architecture for securing the main assets and services of GE and Non-GE entities in Kuwait. In each of these zones specific and unique security focus are addressed. For each zone of the layered cyber-security systems architecture, technological security elements are presented to help in securing IT assets and services of the organizations. Such a layered cyber-security systems architecture will assist the organizations in creating clear boundaries in order to effectively and practically apply multiple layers of defenses. IJISM 2015-11 Article REM application/pdf en http://irep.iium.edu.my/45854/1/IJISM_472.pdf Alenezi, Khalid and Alshaikhli, Imad Fakhri Taha and Abdullah, Lili Marziana and AlAhmad, Mohammad A. (2015) CERT Technologies. International Journal of Innovation in Science and Mathematics, 3 (6). pp. 275-282. ISSN 2347–9051 http://www.ijism.org/
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alenezi, Khalid
Alshaikhli, Imad Fakhri Taha
Abdullah, Lili Marziana
AlAhmad, Mohammad A.
CERT Technologies
description Members of the incident response team should have excellent technical skills, such as system administration, network administration, programming, technical support, malware analysis, and intrusion detection. Moreover, supporting system state and status reporting are associated with enabling automated mechanisms with the hardware or software that report information about the system, including abnormal behavior, intrusion attempts, or any other data that would be useful in detecting an incident, understanding impact, and quickly supporting resolution. In order to effectively protect GE and Non-GE entities from cyber-attacks, multiple layers of defenses strategies are needed to combat multiple security issues. The strategy is based on using appropriate security countermeasures across operational, network, and host functionality of GE and Non- GE entities. Therefore, we proposed four zones segment information architecture for securing the main assets and services of GE and Non-GE entities in Kuwait. In each of these zones specific and unique security focus are addressed. For each zone of the layered cyber-security systems architecture, technological security elements are presented to help in securing IT assets and services of the organizations. Such a layered cyber-security systems architecture will assist the organizations in creating clear boundaries in order to effectively and practically apply multiple layers of defenses.
format Article
author Alenezi, Khalid
Alshaikhli, Imad Fakhri Taha
Abdullah, Lili Marziana
AlAhmad, Mohammad A.
author_facet Alenezi, Khalid
Alshaikhli, Imad Fakhri Taha
Abdullah, Lili Marziana
AlAhmad, Mohammad A.
author_sort Alenezi, Khalid
title CERT Technologies
title_short CERT Technologies
title_full CERT Technologies
title_fullStr CERT Technologies
title_full_unstemmed CERT Technologies
title_sort cert technologies
publisher IJISM
publishDate 2015
url http://irep.iium.edu.my/45854/1/IJISM_472.pdf
http://irep.iium.edu.my/45854/
http://www.ijism.org/
_version_ 1643612871997784064
score 13.209306