Security Framework Using Forensic Function and Log Management

Article Preview

Abstract:

The explosive development of the IT field, the number of structured and unstructured data is increasing in geometrical. Also, using these data a number of cyber-crime has occurred. So, the security threat in many areas is a serious problem.The importance of Big Data and analysis techniques has been developing.But, efforts about security are showing a low level relatively.In this paper, we are discussed about security threat and security technology. And, we proposed a new security technique that complements traditional security techniques.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

752-755

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J.H. Kim, S.H. Lim, I.K. Kim, H.S. Cho, B.K. No, Technical Trends of Cyber Security with BigData, 2013 Electronics and Telecommunications Trends, ETRI, 2013, pp.19-29.

Google Scholar

[2] K.I. Jeong, H.N. Park, B.G. Jung, J.S. Jang, M.A. Jung, Big Data and Information Security, Journal of Korea Institute of Information Technology, no. 10, vol. 3, pp.17-22.

Google Scholar

[3] Y.Y. Joe, Understanding of Big Data and Major Issues, The Korean Association for Regional Information Society, no. 16, vol. 3, 10. (2013).

Google Scholar

[4] D.S. Choi, Y.M. Kim, Big Data and Integrated Security 2. 0, Journal of Information Science, 2012, pp.65-72.

Google Scholar

[5] D.W. Lee, Security Issues of Big Data Period, (2012).

Google Scholar

[6] IDG IT WORLD, Company's Security Strategy Corresponding to APT Threats, IDG Tech Focus.

Google Scholar

[7] IDG IT WORLD, Big Data Security Analysis, IDG Tech Focus.

Google Scholar