An Advanced Generation Model for a Security Data Warehouse

被引:0
|
作者
Piprani, Baba
Ernst, Denise
机构
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011 WORKSHOPS | 2011年 / 7046卷
关键词
Security; ORM; data warehouse; metamodel; security breach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With all the modernistic web based tools available today, it is ironic that managing a security program in an organization is often relegated to a paper-pencil exercise using outdated information, with an on-going guessing game as to the status and inventory of installed controls, equipment configurations etc. Tracking the incessant onslaught of security breach attempts occurring at an ever increasing pace often is a nightmare. A Fact Based model along with a process model is presented here as a candidate for security information to be contained in a BI-style security Data Warehouse, detailing the primary facts and artifacts of an organization's security program framework and security strategy. The model enables one to draw intelligence from security events, current state of security management and training, risk communication, security architecture and administration controls in place. standards being followed etc., and essentially promotes the concept of availability of security intelligence-data warehouse style.
引用
收藏
页码:288 / 297
页数:10
相关论文
共 50 条
  • [1] A prototype model for data warehouse security based on metadata
    Katic, N
    Quirchmayr, G
    Schiefer, J
    Stolba, M
    Tjoa, AM
    NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 300 - 308
  • [2] Impact of Artificial Intelligence on the Generation Process of the Data Warehouse Model
    Sen, Ibtissam Arras
    Laaroussi, Khadija
    Rabhi, Ouzayr
    Erramdani, Mohammed
    Hassas, Mohammed
    ADVANCES IN SMART MEDICAL, IOT & ARTIFICIAL INTELLIGENCE, VOL 1, ICSMAI 2024, 2024, 11 : 59 - 67
  • [3] General considerations on Data Warehouse security
    Villarroel, R
    Fernández-Medina, E
    Piattini, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 242 - 248
  • [4] Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study
    Farhan, Marwa S.
    Marie, Mohamed E.
    El-Fangary, Laila M.
    Helmy, Yehia K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 115 - 122
  • [5] COMPUTER-ASSISTED GENERATION OF DATA WAREHOUSE MODEL: ANALYSIS OF INFORMATION
    Alonso Gomez-Beltran, Lindsay
    Moreno-Rodriguez, Rosendo
    Perez-Vazquez, Ramiro
    DYNA-COLOMBIA, 2013, 80 (177): : 49 - 58
  • [6] A security model of data warehouse based-on active-defense technique
    Wang, JF
    Wang, XH
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 338 - 341
  • [7] Using ORM-based models as a foundation for a data quality firewall in an advanced generation data warehouse
    Piprani, Baba
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1148 - 1159
  • [8] Security Issues In Data Warehouse: A Systematic Review
    Gosain, Anjana
    Arora, Amar
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 149 - 157
  • [9] Adaptive Security for Cloud Data Warehouse as a Service
    Guermazi, Emna
    Ben Ayed, Mounir
    Ben-Abdallah, Hanene
    2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 647 - 650
  • [10] Analysis of Security Techniques and Issues in Data Warehouse
    Phoghat, Parul
    Maitrey, Seema
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 936 - 940