نتایج جستجو برای: security management

تعداد نتایج: 1006782  

Journal: :CoRR 2012
Heru Susanto Mohammad Nabil Almunawar Yong Chee Tuan Mehmet Sabih Aksoy

– Multimedia Information security becomes a important part for the organization’s intangible assets. Level of confidence and stakeholder trusted are performance indicator as successes organization, it is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their multimedia information assets. The main objective of this paper is to Provide a nov...

Journal: :CoRR 2012
Heru Susanto Mohammad Nabil Almunawar Yong Chee Tuan Mehmet Sabih Aksoy Wahyudin P. Syam

Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...

2016
Moufida Sadok Peter M. Bednar

In this paper we report some results of a survey involving 33 Small and Medium-sized Enterprises (SMEs) in the UK on how they approach information security risks and what the human and organisational issues related to their risk-management practices are. All of the interviewed employees are handling sensitive data, needed to do their job, but without necessarily having the most knowledge or res...

2004
Elmarie Kritzinger Sebastiaan H. von Solms

Securing information is vital for the survival of many organizations. Therefore, information must be proactively secured against harmful attacks. This securing of information becomes more complex when such information is transmitted over networks. This paper identifies five non-technical pillars (essentials) for network security management. For each pillar a number of specific actions are speci...

2011
Danijel Milicevic Matthias Goeken

Information technology has had a significant impact on business operations and allowed the emergence of new business models. These IT-enabled processes and businesses however depend on secure information systems which need to be managed. The management of information systems security (ISS) is a highly dynamic and complex task due to constant change in the information technology domain. In this ...

1999
L. Sacks

This paper discusses security of management systems which have to integrate and co-operate through use of management services from different service providers. The individual management systems involved must be viewed as independent security domains, which must share common inter-domain security measures in order to communicate securely. The inter-domain security must then be standardised, pref...

2012
Roland Rieke Luigi Coppolino Andrew Hutchison Elsa Prieto Chrystel Gaber

This paper addresses security information management in complex application scenarios. Security Information and Event Management (SIEM) systems collect and examine security related events, with the goal of providing a unified view of the monitored systems’ security status. While various SIEMs are in production, there is scope to extend the capability and resilience of these systems. The use of ...

2017
D. A. Cabrera-Gaytán G. F. Pérez-Pérez L. Arriaga-Nieto A. Vallejos-Parás R. Padilla-Velázquez C. Grajales-Muñiz

a Surgeon specialising in Epidemiology and Professor of Hospital Administration and Public Health, Epidemiological Surveillance Management, Mexican Social Security Institute, Mexico City, Mexico b Surgeon specialising in Epidemiology, Epidemiological Surveillance Management, Mexican Social Security Institute, Mexico City, Mexico c Surgeon specialising in Epidemiology and Professor of Public Hea...

2008
Pooya Jaferian David Botta Kirstie Hawkey Konstantin Beznosov

One of the most important factors that impact usability of security systems within an organization are security tools. In this paper, we report preliminary results of our survey about design guidelines for IT security management tools. We gathered guidelines and recommendations related to IT security management tool from available literature as well as result of our previous studies on IT secur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید