Mostrar el registro sencillo del ítem
Systematic review of SIEM technology: SIEM-SC birth
dc.contributor.author | López Velásquez, Juan Miguel | |
dc.contributor.author | Martínez Monterrubio, Sergio Mauricio | |
dc.contributor.author | Sánchez Crespo, Luis Enrique | |
dc.contributor.author | Garcia Rosado, David | |
dc.date | 2023 | |
dc.date.accessioned | 2023-10-25T14:07:48Z | |
dc.date.available | 2023-10-25T14:07:48Z | |
dc.identifier.issn | 1615-5262 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/15464 | |
dc.description.abstract | This paper contains a systematic review carried out to address the current status of the System Information and Event Management (SIEM) technology and what may possibly be the next steps in the future. We shall focus on: where SIEM will shift in the near/long-term future, whether this change will affect the technology as it is right now, and finally, what benefits users will obtain from this growing security-monitoring technology. The paradigm of this technology is slowly shifting from monitoring/alerting to demanding international standards with which all security tools must comply in every internal or external audit, leaning toward security-as-a-service rather than premise solutions and improvements to detection engines in order to make them respond faster and in a more agile and accurate manner, thus optimizing analyst time. All of this had been taken into account by comparing, analyzing, correcting, and predicting the near future of this technology, highlighting its usage together with the compatibility of cutting edge technology such as Blockchain, containers, cloud, international compliance. Of the papers analyzed, 50% were new proposals at the time of their publication, impacting on SIEM functionality, and 19% were involved in real scenarios. The authors use the papers analyzed as the basis on which to propose a new framework that is compatible with GDPR, using multiple technologies blockchain, encryption, and containers. This framework has been denominated as SIEM-SC (Security Compliance). | es_ES |
dc.language.iso | eng | es_ES |
dc.relation.ispartofseries | ;vol. 22, nº 3 | |
dc.relation.uri | https://link.springer.com/article/10.1007/s10207-022-00657-9 | es_ES |
dc.rights | restrictedAccess | es_ES |
dc.subject | GDPR | es_ES |
dc.subject | information security compliance | es_ES |
dc.subject | privacy laws | es_ES |
dc.subject | security events | es_ES |
dc.subject | security information | es_ES |
dc.subject | SIEM | es_ES |
dc.subject | Scopus | es_ES |
dc.subject | JCR | es_ES |
dc.title | Systematic review of SIEM technology: SIEM-SC birth | es_ES |
dc.type | Articulo Revista Indexada | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1007/s10207-022-00657-9 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |