Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Management

Encyclopedia of Information Science and Technology, Second Edition
It means the calculation of the damage caused by a certain attack in advance so one can decide if a particular security investment as buying new devices or training employees is worth it or not.
Published in Chapter:
Intrusion Detection Based on P2P Software
Zoltán Czirkos (Budapest University of Technology and Economics, Hungary) and Gábor Hosszú (Budapest University of Technology and Economics, Hungary)
DOI: 10.4018/978-1-60566-026-4.ch353
Abstract
The importance of the network security problems come into prominence by the growth of the Internet. The article presents a new kind of software, which uses just the network, to protect the hosts and increase their security. The hosts running this software create an Application Level Network (ALN) over the Internet. Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps by oneself. The developed software is named Komondor (Czirkos, 2006), which is a famous Hungarian guard dog. The novelty of the system Komondor is that Komondor nodes of each host create a Peer-To-Peer (P2P) overlay network. Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network. The use of the peer-to-peer network model for this purpose is new in principle. Test results proved its usefulness. With its aid, real intrusion attempts were blocked. This software is intended to mask the security holes of services provided by the host, not to repair them. For this it does not need to know about the security hole in detail. It can provide some protection in advance, but only if somewhere on the network an intrusion was already detected. It does not fix the security hole, but keeps the particular attacker from further activity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Big Data Security: Challenges, Recommendations and Solutions
Security management is a part of the overall management system of an organization. It aims to handle, implement, monitor, maintain, and enhance data security.
Full Text Chapter Download: US $37.50 Add to Cart
Current Challenges in Intrusion Detection Systems
In network management, the task of defining and enforcing rules and regulations regarding the use of the resources.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
This is the process of monitoring and controlling access to network resources. This includes monitoring usage network resources, recording information about the usage of resources, detecting attempted or successful violations, and reporting such violations.
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
It means the calculation of the damage caused by a certain attack in advance, so one can decide, if a particular security investment such as buying new devices or training employees is worth or not.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR