This paper describes some patterns for information security problems that consistently emerge
among traditional enterprise networks and applications, both with respect to cyber threats and data
sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network
operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of
data aggregates, training efficacy, and security decision support in the human machine interface. While
proven techniques can address many enterprise security challenges, we provide additional
recommendations on how to further improve overall security posture, and suggest additional research
thrusts to address areas where known gaps remain.
Thomas Macklin and Joseph Mathews, "Big data, little security: Addressing security issues in your platform," Proc. SPIE 10207, Next-Generation Analyst V, 102070G (Presented at SPIE Defense + Security: April 11, 2017; Published: 3 May 2017); https://doi.org/10.1117/12.2268002.
Conference Presentations are recordings of oral presentations given at SPIE conferences and published as part of the conference proceedings. They include the speaker's narration along with a video recording of the presentation slides and animations. Many conference presentations also include full-text papers. Search and browse our growing collection of more than 14,000 conference presentations, including many plenary and keynote presentations.
Study of self-shadowing effect as a simple means to realize nanostructured thin films and layers with special attentions to birefringent obliquely deposited thin films and photo-luminescent porous silicon