SlideShare a Scribd company logo
1 of 22
Workflow Based Security  Incident Management Meletis A. Belsis 1 , Alkis Simitsis 2 ,  Stefanos Gritzalis 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Background ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Background M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 IODEF Incident Data Model
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Contributions ,[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Incident Collection M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Incident Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Incident Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
ETL Workflows M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 More informations can be found at: http://www.dblab.ntua.gr/~asimi/
ETL Workflows ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
System Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 www.dcs.fmph.uniba.sk
System Architecture ,[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
System Architecture M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
Future Work ,[object Object],[object Object],[object Object],[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
[object Object],[object Object],M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005

More Related Content

Viewers also liked

Viewers also liked (6)

Embracing the Consumerization of IT in Your Company
Embracing the Consumerization of IT in Your CompanyEmbracing the Consumerization of IT in Your Company
Embracing the Consumerization of IT in Your Company
 
Combining Operations and Support: Incident Management with Atlassian
Combining Operations and Support: Incident Management with AtlassianCombining Operations and Support: Incident Management with Atlassian
Combining Operations and Support: Incident Management with Atlassian
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 
Theories of Motivation - Overview of the Content Theories of Motivation
Theories of Motivation - Overview of the Content Theories of Motivation Theories of Motivation - Overview of the Content Theories of Motivation
Theories of Motivation - Overview of the Content Theories of Motivation
 

Similar to Workflow Based Security Incident Management

91649526 management-information-system
91649526 management-information-system91649526 management-information-system
91649526 management-information-system
Abhilash Bhaskar
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
RAHUL126667
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
IAEME Publication
 

Similar to Workflow Based Security Incident Management (20)

Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data Lake
 
91649526 management-information-system
91649526 management-information-system91649526 management-information-system
91649526 management-information-system
 
Management information system 2
Management information system 2Management information system 2
Management information system 2
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
Federated_Learning_for_the_Internet_of_Things_Applications_Challenges_and_Opp...
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...
 
ICPSR Data Managment
ICPSR Data ManagmentICPSR Data Managment
ICPSR Data Managment
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
 
Managing Data Integration Initiatives
Managing Data Integration InitiativesManaging Data Integration Initiatives
Managing Data Integration Initiatives
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Workflow Based Security Incident Management

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Background M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 IODEF Incident Data Model
  • 6.
  • 7.
  • 8.
  • 9. Incident Collection M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
  • 10.
  • 11.
  • 12.
  • 13. ETL Workflows M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 More informations can be found at: http://www.dblab.ntua.gr/~asimi/
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. System Architecture M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005
  • 19.
  • 20.
  • 21.
  • 22.