Information System Security Model for ICT Departments

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model for Evaluating Knowledge Sharing Using Fuzzy Inference System (Case Study: Tehran Municipality ICT Organization)

The present paper aimed at developing an approach based on Fuzzy Inference System (FIS) for measuring of knowledge sharing in the organization. In recent years there has been increasing interest in the knowledge sharing by experts and managers in the world, according to increasing importance of knowledge as the key source of competitive advantage, organizations have made serious effort to find ...

متن کامل

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System

The academic literature offers many different frameworks and models of Information Security Governance (ISG). Considerable advancements have been made in identifying the components and principles of ISG. However, the current research has not identified the viability principles and components of ISG that ensure business continuity. This paper proposes a systemic model of ISG using the principles...

متن کامل

SENTINELS Security in ICT, networks and information systems

ions Commercial protocols are larger than the protocols typically appearing in the academic literature and it is an open question how developed verification methods scale up in practice. Hui and Lowe have developed simplifying transformations that have the property of preserving faults, which means that a protocol is secure if its simplified version is secure. These transformations can be used ...

متن کامل

Information System Security Goals

A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation meth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Science and Engineering Applications

سال: 2015

ISSN: 2319-7560

DOI: 10.7753/ijsea0406.1005