نتایج جستجو برای: internal security

تعداد نتایج: 406278  

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

Journal: :CoRR 2017
George Grispos William Bradley Glisson David Bourrie Tim Storer Stacy Miller

Reports and press releases highlight that security incidents continue to plague organizations. While researchers and practitioners’ alike endeavor to identify and implement realistic security solutions to prevent incidents from occurring, the ability to initially identify a security incident is paramount when researching a security incident lifecycle. Hence, this research investigates the abili...

2012
Richard Baskerville Frantz Rowe François-Charles Wolff

This paper reports a study that challenges the widely-held assumption that security and functionality are a tradeoff relationship. Based on a survey sample of more than 9000 French firms, the study finds that higher degrees of system functionality entail higher degrees of security. Rather than sharing a tradeoff relation in which more security investments entail an opportunity cost in terms of ...

2005

Every IT security professional should be up-to-date on the challenges to corporate and government security — and the latest recommendations to address those challenges. Executive summary Today’s virtual enterprise faces a security paradox. The ports and portals that welcome mobile users, customers and business partners into the trusted internal network also, if not appropriately secured, welcom...

2013
Muhammad R Ahmed Xu Huang Hongyan Cui

Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring,...

Journal: :Law and Safety 2023

The article investigates the essence of “security environment” concept, which has recently been used to define goals and areas security defence sector Ukraine, also identifies its structural elements. term is a combination two concepts – “security” “environment”. “Security” means state protection vital interests an individual, society from external internal threats, “environment” set certain co...

2015
Suhaila Ismail Elena Sitnikova Jill Slay

Security awareness and its implementation within an organisation is crucial for preventing deliberate attacks or/and minimise system failures on organisation’s system especially where critical infrastructure is involved including energy, water, gas and etc. This study is based on Integrated System Theory (IST) and focuses on measuring and assessing security goals including policies, risk manage...

2012
A. SAIDI A. RADI

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the field of security of information systems. Despite the undeniable progress, much remains to be done to improve the security of computer networks today. For this, many mechanisms have been developed {[1], [2]}. In general, these systems are vulnerable to attack from unauthorized users (e...

1996
Vesna Hassler N. Lutz Reinhard Posch

This paper presents a model of a secure collaborative application for conducting real-time electronic meetings from remote locations. The application consists of a set of tools, enabling common meeting tasks to be accomplished. The tools can be enhanced with security services at will. The security architecture comprises the standardized communication security services 14], as well as the \group...

2003
Henning Seemann

The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them. The classical concept of end-to-end e-mail security provides maximum theoretical security. But the effort to implement and enforce it at every client has limited the spreading of security and therefore the overall benefit. Centralized e-mail security overcomes this problem. A gateway...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید