Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(308.09KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Information Security Management in University Campus Using Cognitive Security
Roberto Omar Andrade, Susana Cadena, Luis Tello-Oquendo, Iván Ortiz Garcés, Walter Fuertes, Alyssa Cadena, Daniela Córdova, María Fernanda Cazares
Pages - 124 - 134     |    Revised - 30-06-2019     |    Published - 01-08-2019
Volume - 13   Issue - 4    |    Publication Date - August 2019  Table of Contents
MORE INFORMATION
KEYWORDS
Security Operation Center, Cognitive Security, Big Data, Incident Response Team.
ABSTRACT
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
1 Google Scholar 
2 BibSonomy 
3 refSeek 
4 ResearchGate 
5 Scribd 
6 SlideShare 
1 B. Collis and M. van der Wende, "Models of technology and change in higher education: an international comparative survey on the current and future use of ICT in higher education". Netherlands: Center for Higher Education Policy Studies (CHEPS), 2002.
2 BBC News. (2019). Students blamed for college cyber-attacks. [online] Available at: https://www.bbc.com/news/education-45496714 [Accessed 27 Jul. 2019].
3 K. Moller, "Setting up a grid-cert: experiences of an academic CSIRT" in Campus-Wide Information Systems, vol. 24, no. 4, 2007, pp. 260-270.
4 Tello-Oquendo, L.; Tapia, F.; Fuertes, W.; Andrade, R.; Erazo, N.; Torres, J. and Cadena, A. (2019). A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy.In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-372-8, pages 328-336. DOI: 10.5220/0007753503280336.
5 Cadena, A., Gualoto, F., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F., & Torres, J. (2019). Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. Developments and Advances in Defense and Security, 507-519. doi:10.1007/978-981-13-9155-2_40.
6 C. Holsapple, "Dss architecture and types", Decis. Support Syst., vol. 1, pp. 163-189, 01 2008.
7 S. Berenjian, M. Shajari, N. Farshid, and M. Hatamian, "Intelligent automated intrusion response system based on fuzzy decision making and risk assessment," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), Sept 2016, pp. 709-714.
8 V. M. Lanchas, V. A. V. Gonzalez, and F. R. Bueno, "Ontologies-based automated intrusion response system," in Computational Intelligence in Security for Information Systems 2010, 2010, pp. 99-106.
9 C. Mu and Y. Li, "An intrusion response decision-making model based on hierarchical task network planning," Expert Systems with Applications, vol. 37, pp. 2465-2472, 03 2010.
10 A. Shameli-Sendi and M. Dagenais, "Arito: Cyber-attack response system using accurate risk impact tolerance," International Journal of Information Security, vol. 13, no. 4, pp. 367-390, Aug 2014. [Online]. Available: https://doi.org/10.1007/s10207-013-0222-9.
11 A. Shameli-Sendi, H. Louafi, W. He, and M. Cheriet, "Dynamic optimal countermeasure selection for intrusion response system," IEEE Trans. on Dep. and Sec. Comp., vol. 15, no. 5, pp. 755-770, Oct 2018.
12 S. Iannucci and S. Abdelwahed, "Model-based response planning strategies for autonomic intrusion protection," ACM Trans. Auton. Adapt. Syst., vol. 13, no. 1, pp. 4:1-4:23, Apr. 2018. [Online]. Available: http://doi.acm.org/10.1145/3168446.
13 Andrade, R., Torres, J., & Flores, P. (2018). Management of information security indicators under a cognitive security model. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). doi:10.1109/ccwc.2018.8301745.
Mr. Roberto Omar Andrade
Escuela Politécnica Nacional, Quito, Ecuador - Ecuador
roberto.andrade@epn.edu.ec
Mrs. Susana Cadena
Universidad Central del Ecuador, Quito, Ecuador - Ecuador
Mr. Luis Tello-Oquendo
Universidad Nacional de Chimborazo, Riobamba, Ecuador - Ecuador
Mr. Iván Ortiz Garcés
Universidad de las Américas, Quito, Ecuador - Ecuador
Mr. Walter Fuertes
Universidad de las Fuerzas Armadas ESPE Quito, Ecuador Sangolquí, Ecuador - Ecuador
Miss Alyssa Cadena
Escuela Politécnica del Ejército, Sangolquí, Ecuador - Ecuador
Ms. Daniela Córdova
Escuela Politécnica Nacional, Quito, Ecuador - Ecuador
Ms. María Fernanda Cazares
Universidad Politécnica Salesiana, Quito, Ecuador - Ecuador