نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
Protecting a harbor against intentional and accidental threats is extremely difficult. Harbors are not closed systems. Rather, they are focal points for the movement of people and cargo, both in land and on water. As such, threats can arise from many sources that range from the smuggling of illegal and dangerous goods to the placement of mines to damage or destroy shipping. To detect the many d...
Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...
It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assump...
PURPOSE Although adolescents' expectations are accurate or moderately optimistic for many significant life events, they greatly overestimate their chances of dying soon. We examine here whether adolescents' mortality judgments are correlated with their perceptions of direct threats to their survival. Such sensitivity would indicate the importance of ensuring that adolescents have accurate infor...
Big Data describes data sets that are too large, to unstructured or too fast changing for analysis. Big Data analytics is the process of analyzing and mining Big Data. Due to increase in number of sophisticated targeted threats and rapid growth in data, the analysis of data becomes too difficult. Today's Big Data security analytics systems rely, on untrustworthy data. As organizations open and ...
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید