top of page

Intelligent Security Tools

Security intelligence is defined as the continuous real-time collection, normalization and analysis of varying data sources generated by...

Network Traffic Anomalies

Machine generated attacks can be performed using various ways but the two popular methods are, bot-net based attacks and proxy-based...

Knowledge Extraction from large-scale data set

Kazemi and Zarrabi (2017) presented a machine learning approach using deep learning network technique for the fraud detection in the...

Distributed Programming

Sakr and Hammoud (2014) defined the distributed system as the one with computers networked together and communicate with each other...

Graph Dataset Partitioning Methods

Graph data is defined as model of data network with interacting and relational nodes, like social networks, web graphs etc. (Chen, Weng,...

Security Framework

Greene (2014) define security framework as a collective term given to guidance on topics related to information systems security,...

Example of Security Incident

Thimou (2018) outlined the data breach of T-Mobile’s customer data identified by security researcher, Ryan Stevenson. Ryan identified...

Risk and Threats

Threat analysis group (2018) define threat as anything that can exploit a vulnerability either intentionally or accidentally to damage or...

Security Plan Implementation

To implement a security plan for an organization, one key step is to set up a security organizational structure with clearly defined...

Security Compliance

Internal controls are defined as the practices and procedures within an organization so that an organization can meet the targets set...

Security Audits

Yeagley (2015) defines audits as periodic validation of the IT security implementation of an enterprise by a certification authority....

Enterprise Security Strategy Plan

ABC LLC is a fictional company which offers telecommunication products and services across United States. People subscribe to ABC company...

Security Organization Structure

Security Organization Structure To implement a security plan for an organization, one key step is to set up a security organizational...

Security Policies

The objective of the corporate email security policy is to outline the principles to be followed across all email related information...

Risk Assessment Plan

Risk assessment plan encompass all the functions, processes and applications in ABC LLC (Metivier, 2017). Specifically, the information...

Security Standards

Greene (2014) define security framework as a collective term given to guidance on topics related to information systems security,...

Information Security Metrics

There could be varying types of metrics gauging the performance of information security posture for an organization. For instance, on a...

Security Awareness

Security awareness and employee engagement are required for a successful implementation of enterprise security plan (Michigan...

Data Migration in NoSQL Databases

In traditional schema based relational database management systems (RDBMS), the database has to be changed before any changes can be done...

Data Warehouse

Connelly & Begg (2015) defined business intelligence (BI) as an umbrella term encompassing collection and analysis of data to extract...

Blog: Blog2
bottom of page