CYBER SECURITY STRATEGY FOR THE DIGITAL SOCIETY
Keywords:
Ciberseguridad, era digital, BIG DATA, SIEMAbstract
In recent years, information technologies have evolved exponentially, the trend towards computerization and the connectivity of all kinds of objects has marked a milestone in the development of this age. But unfortunately on many occasions security management systems have been stagnant in the past. The following work describes the trends of today's digital society and the lack of security systems that are used with respect to the characteristics demanded by the progress in the computerization process. It explains how the most complete solutions such as Security Information and Events Management systems, today require an update that allows them to manage the large volume of data generated in modern networks. Requirements such as big data management, the need for machine learning, the requirement that these systems develop an User and Entity Behavior Analytics are described, also how each of these concepts increase the reliability of the security information that gets from the applications that use them. It also presents the principles that have been adopted for the development of a new generation security platform that ensures a higher success rate in the detection and prevention of increasingly sophisticated threats that arise and develop from the Evolution of the digital age.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
The authors who publish in this journal agree to the following terms:
- The authors retain the copyright and guarantee to the journal the right to be the first publication of the work are distributed under a license of use and distribution "Creative Commons Attribution-NonCommercial-NoDerivativeWorks 3.0 Unported" (CC BY-NC-ND 3.0) You can consult from here the informative version and the legal text of the license that allows others to share the work with an acknowledgement of the authorship of the work and the initial publication in this journal.
- Authors may separately enter into additional agreements for non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are allowed and encouraged to disseminate their work electronically (e.g., in institutional repositories or on their own website) before and during the submission process, as this can lead to productive exchanges as well as earlier and greater citation of published work (see The Effect of Open Access).