نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is that of the malicious insider. These trusted individuals have access to valuable company systems and data, and are well placed to...
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made ...
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...
........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................
the purpose of this study was to examine the english language needs of medical students at tehran university of medical sciences . analysis of the needs took place for three groups: 320 undergraduate students, 30 postgraduate students and 20 university instructors. a triangulation approach to collect data was used in which a combination of the quantitative (using the questionnaires) and qualita...
Fault control and tolerance in WSN is a challenging problem because of limited energy, bandwidth, and computational complexity. While facing numerous threats these severely resource constrained nodes are responsible for data collection, data processing, localization, time synchronization aggregation and data forwarding. One of the effective approaches to control and tolerate these threats is th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید