Vulnerabilities and responsibilities: dealing with monsters in computer security
نویسندگان
چکیده
منابع مشابه
Vulnerabilities and responsibilities: dealing with monsters in computer security
Purpose of this paper In this paper, information security assessment is analysed in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities. Design/methodology/approach Vulnerabilities in information security are compared to the concept ...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملWireless Security: Vulnerabilities and Countermeasures
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
متن کاملSecurity vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world’s first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information, Communication and Ethics in Society
سال: 2009
ISSN: 1477-996X
DOI: 10.1108/14779960911004499