z-logo
open-access-imgOpen Access
Cyber Security System With SIEM And Honeypot In Higher Education
Author(s) -
Jarot S. Suroso,
Caesario Putra Prastya
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/874/1/012008
Subject(s) - honeypot , hacker , computer security , data breach , computer science , information security , information system , security information and event management , united states national security agency , information security management , agency (philosophy) , government (linguistics) , internet privacy , business , cloud computing security , national security , engineering , law , cloud computing , philosophy , electrical engineering , epistemology , political science , operating system , linguistics
Communication science and information technology (ICT) has been progressing and contain complex implication for individual, groups and inter-country relationship. Along with ICT evolution, threats (including theft of information) increase and electronic systems are adopted. As a government agency in higher education with the country’s strategic data, XYZ cannot escape hackers trying to access the assets. Strategic assets include system and company’s data as well as systems and data which might be taken for granted by irresponsible parties. Therefore, it is necessary to secure information and data systems in XYZ. Moreover to test whether the implemented cyber security system can optimally standardize the company’s information and data systems. The application of Security Information Event Management (SIEM) to cyber security systems to detect incoming threat alerts and block access to suspicious threats. While the honeypot is used to deceive the hacker into a fake system intentionally attacked and learning the tricks that intruders use when performing the action. The results of the test of the application of SIEM and Honeypot at XYZ can monitor the monitoring of information system and data-related threats in real-time, and deter and transmit cyber-attacks to adequately protect information security so that the use of cyber security systems with SIEM & Honeypot can secure the information and data systems owned by XYZ optimal.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here