Governmental Efforts and Strategies to Reinforce Security in Cyberspace
نویسندگان
چکیده
منابع مشابه
National Cyber Security Strategies: Global Trends in Cyberspace
Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a...
متن کاملThe Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...
متن کاملidentifying the strategies persian efl learners use in reading an expository text in english and examining its relation to reading-proficiency and motivation: a think-aloud study
هدف اصلی از این مطالعه بررسی نوع و میزان استراتژی هایی بود که دانشجویان فارسی زبان رشته ی زبان انگلیسی در حین خواندن یک متن انگلیسی به کار گرفتند. این مطالعه همچنین به بررسی تفاوت های استراتژی های مورد استفاده بین دارندگان سطح بالا و پایین درک مطلب پرداخت. نوع همبستگی بین استراتژی به کار گرفته و درک مطلب از یک سو و استراتژی به کار گرفته و انگیزه از سوی دیگر نیز در این تحقیق مورد آزمایش قرار گرف...
15 صفحه اولCyberspace security: How to develop a security strategy
Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including t...
متن کاملGuaranteeing Security and Privacy in Cyberspace
The Refereeing Process for the Data & Knowledge Engineering Journal as it is and will be executed in Cyberspace is the subject of this lecture, in particular Security and Privacy aspects.This process can be defined and implemented in the Mokum system; we will show that it complies to the Security and Privacy rules on three levels: 1. Highest: at the Conceptual level. The semantic correctness of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Law Research
سال: 2013
ISSN: 1927-5242,1927-5234
DOI: 10.5539/ilr.v2n1p185