Abstract

This paper presents the concept of security management through collaboration highlighting the limitations for conventional security management systems and the challenges in maintaining an acceptable level of security in organizational environments. There are presented four different aspects regarding information security, aspects that involve malware threats, perimeter protection, exploiting vulnerabilities and detection of vulnerabilities. Analyzing a set of experiments regarding malware protection the paper concludes the need to improve existing protection systems by standardization and collaboration. A set of indicators for measuring the level of security by considering each of four aspects, is presented and analyzed, highlighting the benefits obtained by using collaboration in the process of managing information security. A qualitative indicator is built based on the four aspects of security presented in the paper.Keywords: Collaborative Security Management, Organizational Environment, Security System, Malware Threats, Security Indicator, Perimeter Protection, Intrusion Prevention(ProQuest: ... denotes formulae omitted.)1IntroductionCollaboration in computer systems is closely linked to the evolution of distributed systems and the evolution of communication systems. The fact that computer systems are increasingly used as support for collaboration within business operations, provides the following benefits:* operations are conducted in a rapid and controlled pace through automation and communication channels* there is a possibility to observe the weaknesses of the business process in relation to the relationships between collaborators* the possibility of establishing a historical database used to forecast trends for short and medium term* business continuity depends less on the employees migrationThe benefits of information systems depend to a great extent of information and access to information. It is important for the information to be accessible and consistent with the initial state. Altering information in an unauthorized manner and not based on a real context, reduces the effectiveness of information systems in business processes to the point where it affects an organization's ability to carry out daily activities. It is important that information and access to information to be managed in an appropriate manner so that the computer system that relies on this information to be considered reliable. Issues of confidentiality, integrity and availability of information are being considered in the notion of information security. Information security management operations are represented by mechanisms and techniques used for achieving information security. Information security management in a collaborative computing environment is often a difficult task because people tend to neglect aspects of cybersecurity focusing on achievement of short-term business goals. To prevent unpleasant situations where important information is losing its confidentiality state or it is fraudulently altered, requires the use of computer systems to identify situations that present security risks and block human actions that led to such a situation or issue warnings with respect to the situation. If in small organizations information security is relatively easy to manage and do not necessarily require well-established management processes for managing security, in large and very large organizations information security management is a necessity due to the diversity and variety of environments across the organization. Considering computer security in the global context, the companies are facing common threats coming from outside the company and also particular threats that are specific to each organization. Information security management through collaboration aims to improve security processes that manage threats coming from outside. Using collaboration in this situation makes sense in the context of the organizations using information systems to support daily activities are connected to the Internet, either directly or indirectly. …

Highlights

  • Considering computer security in the global context, the companies are facing common threats coming from outside the company and particular threats that are specific to each organization

  • Establishing a base of common malware without additional measures, leads to the demotivation of those who contribute to the update process, meaning that antivirus manufacturers lose their motivation when they know that their product is updated anyway, without them having to contribute directly

  • In 2012, iMPERVA conducted a study on the effectiveness of antivirus components using emerging samples and concluded that in the case of relatively new samples, detection rate is about 5%, which is extremely low but quite normal considering the principle of operation of these components

Read more

Summary

To determine the success rate in blocking

NRM – number of rules defined for blocking malware attacks the ISMf indicator is being malicious activities, NRM = cardinal (MRD) used and is given by (3.2). According to the way the ISMe and ISMf indicators are being defined, the maximum value that can be achieved is 1 and the minimum value is 0 It follows that Ism, being the average of the two indicators, belongs to the interval [0, 1]. Whether NRMp = cardinal (MRDp) and NRMc = cardinal (MRDc), it results that the number of security rules to block malicious activities, NRM, can be expressed as: NRM = NRMp + NRMc. To measure the benefits on malware protection received from collaborators MRB indicator is being used and it is defined by (3.5). Estimated total number of vulnerabilities Number of blocked attempts to exploit existing vulnerabilities

Total number of attempts to exploit vulnerabilities
Number of attacks blocked by perimeter protection system
Conclusions
Findings
Security Management in Distributed
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call