نتایج جستجو برای: information security management system

تعداد نتایج: 3724607  

Journal: :JCP 2012
Weihui Dai Qi Zhu Chunshi Wang Yujiao Zeng

Information system has become the indispensable support platform required by daily operations in modern enterprises. IC manufacturing industry is the most important base of advanced information products. Its rich knowledge innovation, complex production process, and high degree of cooperation require particular risk management on information security. On the basis of referencing to latest infor...

2012
Stefan Poslad Jim Tan Sergi Robles Alois Reitbauer

A metadata model is proposed to represent security configuration and management information. This model can be used to aid dynamic security management and configuration. The exchange of security information within the context of a social interaction and policing model can promote improved safety and security. An application of the model to manage message exchange using a secure message envelope...

Journal: :Int J. Information Management 2015
Lidia Ogiela

This publication discusses advanced knowledge management techniques based on information splitting and sharing algorithms for secret, strategic information. Information splitting techniques will be dedicated to problems of secure information storage and managing sets of strategic data. The management of strategic corporate/organisational data will provide the illustration of the discussion of k...

Journal: :Jurnal Teknik Informatika 2023

SIMWAS is an information system at the XYZ Ministry that used to manage supervisory activities and follow up on results. important asset contains all internal control business processes, but in practice, security risks have not been managed properly. To overcome these problems, risk management needed SIMWAS. This study aims design analyze using NIST SP 800-30 framework. focuses a particular inf...

Journal: :Современные наукоемкие технологии (Modern High Technologies) 2020

Journal: :International Electronic Journal of Pure and Applied Mathematics 2014

2005
Tony Coulson

With powerful regulations surrounding security and privacy of information, the authors attempt to identify challenges valuing information security investments. The authors examine three primary approaches to measuring information value: Perceived, Real, and Normative. Literature is reviewed and the approaches are examined in terms of their strengths and weaknesses in providing value measurement...

Journal: :Visnyk of the Lviv University 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید