MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "e85632d9-1439-48ad-822b-44001086df77"}, "_deposit": {"id": "4607", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4607"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4607", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing the predictive models for estimating theincidence of cyber-attacks for enterprise network inMyanmar are seriously needed. Although we needthese models, there is no record of attacks,defenseless, outcome and threat to utilize thedeveloping predictive models and authentication. Themain purpose of this research is to determinewhether SOC (Security Operation Center) manageruses cyber security model by using SOC resultsfigures to prepare further cyber defense and incidentresponse plan. The goal of this study was achieved byconducting experiments on various cyber-attacksoccurred in security operation center of IndustrialControl System (ICS).Blue team, Incident Handling, SOC,Cyber Security Model, Vulnerabilities, Threats,Attack."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Blue team"}, {"interim": "Incident Handling"}, {"interim": "SOC"}, {"interim": "Cyber Security Model"}, {"interim": "Vulnerabilities"}, {"interim": "Threats"}, {"interim": "Attack"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-17"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf", "filesize": [{"value": "330 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 330000.0, "url": {"url": "https://meral.edu.mm/record/4607/files/Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf"}, "version_id": "6b7108e0-a1e3-4a9d-8274-ee5a27436a63"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Wai Phyo"}, {"subitem_authors_fullname": "Lwin, Htar Htar"}, {"subitem_authors_fullname": "Lin, Kyaw Kyaw"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-7281-5925-6"}, "item_title": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004607", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-17"}, "publish_date": "2020-03-17", "publish_status": "0", "recid": "4607", "relation": {}, "relation_version_is_last": true, "title": ["Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar"], "weko_shared_id": -1}
Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar
http://hdl.handle.net/20.500.12678/0000004607
http://hdl.handle.net/20.500.12678/00000046077c6537bb-a762-42b6-a2c8-6c58b14d60fc
e85632d9-1439-48ad-822b-44001086df77
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar | |||||
Language | en | |||||
Publication date | 2020-02-28 | |||||
Authors | ||||||
Aung, Wai Phyo | ||||||
Lwin, Htar Htar | ||||||
Lin, Kyaw Kyaw | ||||||
Description | ||||||
In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing the predictive models for estimating theincidence of cyber-attacks for enterprise network inMyanmar are seriously needed. Although we needthese models, there is no record of attacks,defenseless, outcome and threat to utilize thedeveloping predictive models and authentication. Themain purpose of this research is to determinewhether SOC (Security Operation Center) manageruses cyber security model by using SOC resultsfigures to prepare further cyber defense and incidentresponse plan. The goal of this study was achieved byconducting experiments on various cyber-attacksoccurred in security operation center of IndustrialControl System (ICS).Blue team, Incident Handling, SOC,Cyber Security Model, Vulnerabilities, Threats,Attack. | ||||||
Keywords | ||||||
Blue team, Incident Handling, SOC, Cyber Security Model, Vulnerabilities, Threats, Attack | ||||||
Identifier | 978-1-7281-5925-6 | |||||
Journal articles | ||||||
Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |