Result Oriented Time Correlation Between Security and Risk Assessments, and Individual Environment Compliance Framework

  • Dimo DimovEmail author
  • Yuliyan Tsonev
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 111)


Security professionals and attackers have common approach on their daily work. Hackers are following the same rule set as the data protectors while seeking for potential vulnerabilities to be exploited. Security assessments are usually deployed on year or mid-year basis. A prepared attacker would need 2 days to take down the environment once it is breached, or to remain unnoticed for more than 6 months. The discrepancies in those two timelines of activities performed on both sides could bring significant implications for any organization. The aim of this article is to suggest an approach for creation of an automated daily security assessment.


Security assessment Automated reporting PowerShell Information security Event forwarding 


Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information TechnologiesNikola Vaptsarov Naval AcademyVarnaBulgaria

Personalised recommendations