INFORMATION SECURITY AUDIT OF AN OPTOELECTRONIC DEVICE ENGINEERING ENTERPRISE
نویسندگان
چکیده
منابع مشابه
Enterprise Engineering: An Information Systems Perspective
We present a framework for enterprise engineering that encompasses the formalization of knowledge in an enterprise, its integration into a software tool, and the visualization of the enterprise.
متن کاملTowards Continuous Information Security Audit
Requirement engineering calls for continuous possibility to check whether latest changes of significant requirements are met by the target systems. This review is important because the environment of the system, if impacted by changes, may lead to new exposures. Current paper reports on knowledge gained during the attempt to move towards continuous security audit by extending one business proce...
متن کاملCountering Social Engineering Through Social Media: An Enterprise Security Perspective
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is ...
متن کاملAssessment of Enterprise Information Security - An Architecture Theory Diagram Definition -
In order to manage and improve something, it is normally necessary to be able to assess the current state of affairs. A problem with assessment, however, is that in order to assess, it is normally necessary to be able to define the assessment topic. These general statements are also true within the area of Enterprise Information Security. Although much has been written on the topic, there is li...
متن کاملInformation Security and Privacy Audit Modeling
The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Interexpo GEO-Siberia
سال: 2020
ISSN: 2618-981X
DOI: 10.33764/2618-981x-2020-6-2-146-151