Corporate Infrastructure

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 14250 Experts worldwide ranked by ideXlab platform

Merike Kaeo - One of the best experts on this subject based on the ideXlab platform.

  • Designing Network Security, Second Edition
    2003
    Co-Authors: Merike Kaeo
    Abstract:

    A practical guide to creating a secure network Infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network Infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologiesDesigning Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your Corporate network Infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a Corporate security policy.You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a Corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network Infrastructure equipment to implement the given security policy, including securing the internal Corporate Infrastructure, Internet access, and the remote access environment.This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

  • Designing Network Security
    1999
    Co-Authors: Merike Kaeo
    Abstract:

    A practical guide to creating a secure network Infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network Infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your Corporate network Infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a Corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a Corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network Infrastructure equipment to implement the given security policy, including securing the internal Corporate Infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Yuri Nikolashin - One of the best experts on this subject based on the ideXlab platform.

  • Scalable Data Processing Approach and Anomaly Detection Method for User and Entity Behavior Analytics Platform
    Intelligent Distributed Computing XIII, 2020
    Co-Authors: Alexey Lukashin, Anatoliy Bolshakov, Mikhail Popov, Yuri Nikolashin
    Abstract:

    User and entity behavior analytics (UEBA) is a popular and modern way of finding security threats in Corporate Infrastructure. Anomaly detection in data allows detecting incidents which cannot be detected by other methods including rules in classical SIEM systems. But there are several problems requiring the development of scalable software and analytical methods which can handle thousands of events per second. The paper describes approaches for processing semi-structured data from different sources for further analytics using anomaly detection methods. The new method of building features from hybrid data streams from different SIEM sources has been introduced. The paper also contains a study of efficiency and scalability of the developed approach.

  • IDC - Scalable Data Processing Approach and Anomaly Detection Method for User and Entity Behavior Analytics Platform
    Intelligent Distributed Computing XIII, 2019
    Co-Authors: Alexey Lukashin, Anatoliy Bolshakov, Mikhail Popov, Yuri Nikolashin
    Abstract:

    User and entity behavior analytics (UEBA) is a popular and modern way of finding security threats in Corporate Infrastructure. Anomaly detection in data allows detecting incidents which cannot be detected by other methods including rules in classical SIEM systems. But there are several problems requiring the development of scalable software and analytical methods which can handle thousands of events per second. The paper describes approaches for processing semi-structured data from different sources for further analytics using anomaly detection methods. The new method of building features from hybrid data streams from different SIEM sources has been introduced. The paper also contains a study of efficiency and scalability of the developed approach.

Karen Dye - One of the best experts on this subject based on the ideXlab platform.

  • building continuity into strategy
    Journal of Corporate Real Estate, 2005
    Co-Authors: Scott P Foster, Karen Dye
    Abstract:

    A recent article in Strategy + Business magazine set out that the three primary goals of the CEO for creating ‘business resilience’ include (1) securing the people of the enterprise; (2) securing the core business of the enterprise (systems, facilities, Infrastructure and processes); and (3) securing the business networks (such as the supply chain). Given these three goals, who is better suited to take on a leadership role in coordinating business continuity than the senior managers of Corporate real estate (CRE) and workplace resource (WR) organisations? For several years, as the concept of Corporate Infrastructure Resource Management (CIRM) has evolved, senior CRE managers have sought out ways to create additional value for the enterprise’s core businesses. The authors believe that CRE organisations possess many of the competencies required to play significant roles in their business continuity programmes, and seizing this opportunity to fill the gaps can elevate the profile of workplace to the executive level. This paper presents a simple framework, based on five leverage points, that will enable CRE to take a more active leadership role in managing business continuity and to move to a ‘strategy and continuity’ model for managing Corporate real estate.

Leonardo Mostarda - One of the best experts on this subject based on the ideXlab platform.

  • Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems
    IEEE Access, 2020
    Co-Authors: Akashdeep Bhardwaj, Fadi Al-turjman, Manoj Kumar, Thompson Stephan, Leonardo Mostarda
    Abstract:

    Industrial Control Systems monitor, automate, and operate complex Infrastructure and processes that integrate into critical industrial sectors that affect our daily lives. With the advent of networking and automation, these systems have moved from being dedicated and independent to centralized Corporate Infrastructure. While this has facilitated the monitoring and overall management using traditional detection methods, Web Application Firewalls or Intrusion Detection Systems has exposed the networks subjecting them to Behavior-based cybersecurity attacks. Such attacks alter the control flow and processes and have the malicious ability to alter the functioning of these systems altogether. This research focuses on the use of process analytics to detect attacks in the industrial control Infrastructure systems and compares the effectiveness of signature-based detection methods. The proposed work presents a pattern recognition algorithm aptly named as “Capturing-the-Invisible (CTI)” to find the hidden process in industrial control device logs and detect Behavior-based attacks being performed in real-time.

Kathryn Rudie Harrigan - One of the best experts on this subject based on the ideXlab platform.

  • The Changing Face of Private Equity: How Modern Private Equity Firms Manage Investment Portfolios
    The Journal of Private Equity, 2009
    Co-Authors: Daniel O Klier, Martin K Welge, Kathryn Rudie Harrigan
    Abstract:

    This article presents a comprehensive analysis of private equity management models and outlines two distinct models: one being a traditional financial investor with focus on financial engineering and selective changes in the governance model of portfolio companies, the other representing a modern form of private equity seeking value creation through active ownership. Active investors are able to significantly outperform more traditional financial investors by realizing the proceeds of intervention in strategic decision making, while avoiding the costs of “Corporate Infrastructure.”