Implementing Knowledge Management Techniques for Security Purposes
نویسندگان
چکیده
Due to its rapid growth, Information Systems Security becomes a new era of expertise, related to a vast quantity of knowledge. Exploiting all this knowledge becomes a difficult task, due to its heterogeneity. Knowledge Management (KM) on the other hand, becomes an expanding and promising discipline that has drawn considerable attention. In this paper we deploy our arguments about the benefits of KM techniques and their possible applications to assist security officers in improving their productivity and effectiveness. To prove this, we exploit possible technological prospects, and we present the architecture of a prototype developed to implement selected innovating KM components, embedding state-of-the-art multimedia java-
منابع مشابه
Smart Grid Security: Challenges and Solutions
State estimation is an important power system tool used to best estimate the system state through analysis of remotely collected sensor measurements and the power system topology. The reliability of the estimated output depends on the quality of the input measurements. Therefore, grid operators use Bad Data Detection (BDD) techniques to filter out grossly erroneous measurements from the state e...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملAn Approach for Finding Guilty One with Fake Object Allocation
As organizations increase their reliance on, presumably distributed, data systems for daily business, they become additional vulnerable to security breaches whilst they gain productivity and potency blessings. Although variety of techniques, such as encryption and electronic signatures, are presently offered to safeguard knowledge once transmitted across sites, a very comprehensive approach for...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملPBKM: A Secure Knowledge Management Framework
We envision knowledge management systems as a platform facilitating the extraction, storage, retrieval, integration, transformation, visualization, analysis, dissemination, and utilization of knowledge. We present a system framework for secure knowledge management systems which, in addition to implementing the functionality of knowledge management and providing standard security mechanisms such...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004