نتایج جستجو برای: internal security
تعداد نتایج: 406278 فیلتر نتایج به سال:
The area of internal security is umbrella definition, which combine two European Union policies in the field police cooperation and judicial criminal matters. This article aimed at solving a scientific problem related to determination essential characteristics legal nature EU bodies agencies that realize policy on combating crime. studies institutional framework security, analyzes specialized d...
to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...
This paper discusses the result of two case studies performed in a large international company to test the use of chatbots for internal security training. The first study targeted 26 end users in the company while the second study examined 80 security specialists. From a quantitative analytical perspective there does not appears to be any significant findings when chatbots are used for security...
This paper describes new security architecture for personal area networks (PANs). We give an overview of the PAN model we have used and the PAN security problems that we have tackled. The problem area is illustrated with a business meeting example. We base the security architecture on a new PAN reference model, which we describe. The trust model on which the security architecture is based is al...
Information Security Culture includes all socio-cultural measures that support technical security methods, so that information security becomes a natural aspect in the daily activity of every employee. To apply these socio-cultural measures in an effective and efficient way, certain management models and tools are needed. In our research we developed a framework analyzing the security culture o...
Approaches to the management of Information Systems (IS) security in organizations have relied mostly on complex technical controls. In recent years, management of IS security by developing a security culture in organizations is emerging as an important stream in IS security research. The intent of this study is to contribute to the body of knowledge dealing with security culture. Security cult...
the disappearance of bipolar system following the disintegration of the soviet union, has also changed many strategic concepts. central asia, as a part of the soviet empire, has become an arena for regional and global challenges after these transformations. the region, already faced with various political, economic, social and cultural problems, soon became a location for the activities of isla...
With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید