Network security: private communication in a public world
Network security: private communication in a public world
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Virtual private networks
Information warfare and security
Information warfare and security
Intrusion detection
Linux firewalls
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Intrusion Detection
Building Internet Firewalls
Internet Firewalls and Network Security
Internet Firewalls and Network Security
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Implementing Virtual Private Networks
Implementing Virtual Private Networks
Security in Computing
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems
Hi-index | 0.00 |
An automated security management integrating various security systems is strongly required because cyber attacks are evolving day after day. Moreover, the attacks are become more complex and intelligent than past. Several integrated security management (ISM) models are supposed and implemented to meet the requirements. However, the current ISM is passive and behaves in a post-event manner. To reduce costs and resources for managing security and to remove the possibility of an intruder succeeding in attacks, the preventive security management technology is strongly required. This paper proposes the PRISM model that is based on tracing important assets in a managed network and performs preventive security management before security incidents occur. Additionally, PRISM model employs security labels to deploy differentiated security measure. The PRISM will provide concrete and effective security management to the organization's network.