Operational Security Log Analytics for Enterprise Breach Detection.
Zhou LiAlina OpreaPublished in: SecDev (2016)
Keyphrases
- security management
- automatic detection
- sensitive data
- personal data
- object detection
- data management
- enterprise systems
- detection method
- false positives
- information security
- detection rate
- key performance indicators
- intrusion detection
- information management
- network security
- data storage
- security policies
- detection algorithm
- access control
- definitive guide
- information security management
- computer security
- data analysis
- security mechanisms
- security requirements
- security issues
- false alarms
- business intelligence
- information technology