Fig 44 - uploaded by Elbachir Haimoud
Content may be subject to copyright.
example of a secure network uses IDS/IPS, DMZ, firewall, and proxy. SecureWorks DELL project's. 

example of a secure network uses IDS/IPS, DMZ, firewall, and proxy. SecureWorks DELL project's. 

Source publication
Conference Paper
Full-text available
Information technology security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This paper gives an overview of information security management systems. By the end of this paper you should have developed an understanding of: some tactics used by hackers to hack into...

Similar publications

Article
Full-text available
This article shows an environment for performing data collection in the computational system that provides the response service to “HTTP” requests and makes interventions in the values of the available parameters in order to control the system automatically in closed loop. The parameters to be obtained as endogenous variables of the computational s...

Citations

... Black hat hackers, sometimes called crackers, are typically motivated by personal gains from illegally breaching computer systems (Krit & Haimoud, 2016). However, they might also be social mischief-makers seeking the thrill of the attack, revenge, or notoriety. ...
Article
Full-text available
This paper investigates the psychological traits of individuals' attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new set of scales have been developed to assist in the delineation of the three hat categories. We have also developed a scale to measure each subject's perception of the probability of being apprehended for violating privacy laws. The results suggest that white hat, grey hat, and black hat hackers score high on the Machiavellian and psychopathy scales. We also found evidence that grey hatters oppose authority, black hatters score high in the thrill-seeking dimension, and white hatters, the good guys, tend to be narcissists. Thrill-seeking was moderately important for white hat and black hat hacking, and opposition to authority was significant for grey hat hacking. Narcissism was not statistically significant in any of the models. A perceived probability of being apprehended had a negative effect on both grey hat and black hat hacking. Additional models were explored to examine the relationships among the research variables.
... With the rapid development of network and communication technologies, there has been increasing amount of attention on the security of network systems [1]. Network security is usually reflected by relevant data generated, originated or extracted from the network system. ...
Article
Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.
... With the rapid development of network and communication technologies, there has been an increasing amount of attention to the security of network systems [1]. Network security is usually reflected by relevant data generated, originated, or extracted from the network system. ...
Article
Full-text available
Security threats and shows abnormality about security, safety, privacy, and trust as network security-related data, in short, security-related data. The first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we present many approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in network and Information Security that consists of Information Security in Big Data and Cloud Computing.
... We then discuss open issues, challenges and future research trends in this field. Specifically, our contributions can be summarized as follows: 1) We propose a number of requirements and objectives in terms of collecting the security-related data in a large scale heterogeneous network system, which can be used to evaluate existing related works; ...
Article
Full-text available
Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats. We define these data as network security-related data. Studying and analyzing security-related data can help detect network attacks and intrusions, thus making it possible to further measure the security level of the whole network system. Obviously, the first step in detecting network attacks and intrusions is to collect security-related data. However, in the context of big data and 5G, there exist a number of challenges in collecting these security-related data. In this paper, we first briefly introduce network security-related data, including its definition and characteristics, and the applications of network data collection. We then provide the requirements and objectives for security-related data collection and present a taxonomy of data collection technologies. Moreover, we review existing collection nodes, collection tools and collection mechanisms in terms of network data collection and analyze them based on the proposed requirements and objectives towards high quality security-related data collection. Finally, we discuss open research issues and conclude with suggestions for future research directions.