Abstract
AbstractThe phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference48 articles.
1. John H (2019). What will 2019 bring to the on-demand services economy? Available at: https://medium.com/@jhrzic/what-will-2019-bring-to-the-on-demand-services-economy-c99de54bc6a7 [Accessed on 10th October 2019]
2. Reichenbach M (2004) New challenges in electronic payments. Book chapter appears in the book, intelligent enterprises of the 21st Century, edited by Jatinder Gupta and Sushil Sharma. Copyright © 2004, Idea Group Inc.
3. Adeyemi IR, Razak SA, Azhan NAN (2013) A review of current research in network forensic analysis. Int J Digit Crime Foren 5(1):1–26
4. Roy W., (2013) What is a network? Avaialable at: https://fcit.usf.edu/network/chap1/chap1.htm [Accessed on 10th October 2019]
5. Justin B (2019) How to gain security visibility into a modern environment. Available at: https://blog.rapid7.com/2019/03/27/how-to-gain-security-visibility-into-a-modern-environment/ [Accessed on 10th October 2019]
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献