Governmental Efforts and Strategies to Reinforce Security in Cyberspace

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

National Cyber Security Strategies: Global Trends in Cyberspace

Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a...

متن کامل

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

متن کامل

identifying the strategies persian efl learners use in reading an expository text in english and examining its relation to reading-proficiency and motivation: a think-aloud study

هدف اصلی از این مطالعه بررسی نوع و میزان استراتژی هایی بود که دانشجویان فارسی زبان رشته ی زبان انگلیسی در حین خواندن یک متن انگلیسی به کار گرفتند. این مطالعه همچنین به بررسی تفاوت های استراتژی های مورد استفاده بین دارندگان سطح بالا و پایین درک مطلب پرداخت. نوع همبستگی بین استراتژی به کار گرفته و درک مطلب از یک سو و استراتژی به کار گرفته و انگیزه از سوی دیگر نیز در این تحقیق مورد آزمایش قرار گرف...

15 صفحه اول

Cyberspace security: How to develop a security strategy

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including t...

متن کامل

Guaranteeing Security and Privacy in Cyberspace

The Refereeing Process for the Data & Knowledge Engineering Journal as it is and will be executed in Cyberspace is the subject of this lecture, in particular Security and Privacy aspects.This process can be defined and implemented in the Mokum system; we will show that it complies to the Security and Privacy rules on three levels: 1. Highest: at the Conceptual level. The semantic correctness of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Law Research

سال: 2013

ISSN: 1927-5242,1927-5234

DOI: 10.5539/ilr.v2n1p185