Security Vigilance System through Level Driven Security Maturity Model
نویسندگان
چکیده
منابع مشابه
Security Vigilance System through Level Driven Security Maturity Model
Success of any software system largely looms upon its vigilance efficiency that prompts organizations to meet the set of objectives in the arena of networks. In the highly competitive world, everything appears to be vulnerable; information system is also not an exception to this fact. The security of information system has become a cause of great concern. On the contrary, till time the software...
متن کاملToward a Research Software Security Maturity Model
Such statements evidence that security should indeed be a first-class consideration of the software ecosystem. In this position paper, we share some thoughts related to research software security. Our thoughts are based on the observation that security is not a binary, all-or-nothing attribute, but a range of practices and requirements depending on how the software is expected to be deployed an...
متن کاملA Balanced Scorecard Approach to Evaluate Corporate Information Security Level and Suggestion of a Security Maturity Model
متن کامل
OS Security Enhancement System by Considering Security Level
Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using t...
متن کاملPresenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity
Undoubtedly, in today’s new business information has donated the most competitive advantage for the organizations. Although just collecting, processing and retrieving of data were significant in the past, the subject of information security is turned into a serious challenge in micro and macro levels of organizational management. Indeed, observance of the information security principals is coun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science, Engineering and Information Technology
سال: 2012
ISSN: 2231-3605
DOI: 10.5121/ijcseit.2012.2202