2011 Awards for Excellence

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 16 March 2012

237

Keywords

Citation

(2012), "2011 Awards for Excellence", Information Management & Computer Security, Vol. 20 No. 1. https://doi.org/10.1108/imcs.2012.04620aaa.001

Publisher

:

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited


2011 Awards for Excellence

Article Type: 2011 Awards for Excellence From: Information Management & Computer Security, Volume 20, Issue 1

The following article was selected for this year’s Outstanding Paper Award for Information Management Computer Security

“Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system”

Dimitrios PatsosDepartment of Informatics, University of Piraeus, Piraeus, Greece

Sarandis MitropoulosDepartment of Informatics, University of Piraeus, Piraeus, Greece

Christos DouligerisDepartment of Informatics, University of Piraeus, Piraeus, Greece

Purpose -- The paper proposes looking at the automation of the incident response (IR) process, through formal, systematic and standardized methods for collection, normalization and correlation of security data (i.e. vulnerability, exploit and intrusion detection information).Design/methodology/approach -- The paper proposes the incident response intelligence system (IRIS) that models the context of discovered vulnerabilities, calculates their significance, finds and analyzes potential exploit code and defines the necessary intrusion detection signatures that combat possible attacks, using standardized techniques. It presents the IRIS architecture and operations, as well as the implementation issues.Findings -- The paper presents detailed evaluation results obtained from real-world application scenarios, including a survey of the users’ experience, to highlight IRIS contribution in the area of IR.Originality/value -- The paper introduces the IRIS, a system that provides detailed security information during the entire lifecycle of a security incident, facilitates decision support through the provision of possible attack and response paths, while deciding on the significance and magnitude of an attack with a standardized method.

Keywords: Computer crime, Data security, Risk management

www.emeraldinsight.com/10.1108/09685221011079207

This article originally appeared in Volume 18 Number 4, 2010, pp. 291-309, Information Management & Computer Security

“Exploring the supply of pirate software for mobile devices: an analysis of software types and piracy groups”

Sigi Goode

This article originally appeared in Volume 18 Number 4, 2010, Information Management & Computer Security

“Brand, knowledge, and false sense of security”

Wendy Hui

This article originally appeared in Volume 18 Number 3, 2010, Information Management & Computer Security

Outstanding Reviewers

David EmmKaspersky Lab, UK

Dr Andrew JonesKhalifa University of Science, Technology & Research (KUSTAR), United Arab Emirates

Related articles