Company’s Information and Telecommunication Networks Security Risk Assesment Algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Issues in VoIP Telecommunication Networks

As VoIP telecommunication networks are becoming popular, more and more VoIP calls are being madeto accomplish security critical activities, e.g., E911 services, phone banking. However, the security ram-ifications of using VoIP have not been fully recognized, and there exists a substantial gap in the under-standing of the potential impact of VoIP exploits on the VoIP users. In this c...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

A Novel Security Algorithm for Universal Mobile Telecommunication System

The user authentication process is an important task in mobile networks. With the development of new standard Universal Mobile Telecommunication System (UMTS), the security weaknesses of previous standards are removed. However one security weakness has been found by researchers in UMTS, which is the sending of user's International Mobile Subscriber Identity (IMSI) in plain text over the air int...

متن کامل

Improved Signcryption Algorithm for Information Security in Networks

In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a p...

متن کامل

Genetic Algorithm Approach for Risk Reduction of Information Security

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 80030 and ISO/IEC 27005. However, only few works of rese...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics and Electrical Engineering

سال: 2012

ISSN: 2029-5731,1392-1215

DOI: 10.5755/j01.eee.121.5.1648