Optimizing the Amount of Data to Evaluate the Events of Cyber Security
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60076658%3A12310%2F15%3A43889288" target="_blank" >RIV/60076658:12310/15:43889288 - isvavai.cz</a>
Výsledek na webu
<a href="https://www.erpublication.org/admin/vol_issue2/upload%20Image/IJMCTR031707.pdf" target="_blank" >https://www.erpublication.org/admin/vol_issue2/upload%20Image/IJMCTR031707.pdf</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Optimizing the Amount of Data to Evaluate the Events of Cyber Security
Popis výsledku v původním jazyce
"In the Czech Republic, the law on cyber security has been in force since the beginning of this year, which is based on the "Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union", already approved by the European Parliament. This legislation on cyber security orders to the operators of critical infrastructure and critical information systems to monitor and evaluate the events associated with their operation. The problem is that the IT systems generate huge amounts of events, which makes the implementation of this regulation very costly. The vast majority of data associated with the events is however irrelevant, from the perspective of cyber security. The essay therefore solves the problems of how to select and optimize the data that are processed by the systems evaluating the events. The aim of this work is to design new methods for optimizing data processed in the systems evaluati
Název v anglickém jazyce
Optimizing the Amount of Data to Evaluate the Events of Cyber Security
Popis výsledku anglicky
"In the Czech Republic, the law on cyber security has been in force since the beginning of this year, which is based on the "Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union", already approved by the European Parliament. This legislation on cyber security orders to the operators of critical infrastructure and critical information systems to monitor and evaluate the events associated with their operation. The problem is that the IT systems generate huge amounts of events, which makes the implementation of this regulation very costly. The vast majority of data associated with the events is however irrelevant, from the perspective of cyber security. The essay therefore solves the problems of how to select and optimize the data that are processed by the systems evaluating the events. The aim of this work is to design new methods for optimizing data processed in the systems evaluati
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Modern Communication Technologies & Research
ISSN
2321-0850
e-ISSN
—
Svazek periodika
3
Číslo periodika v rámci svazku
7
Stát vydavatele periodika
IN - Indická republika
Počet stran výsledku
6
Strana od-do
34-39
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—