نتایج جستجو برای: information security management
تعداد نتایج: 1990489 فیلتر نتایج به سال:
Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...
The ultimate aim of the COINS COntrolled INformation Security – project is to investigate, assess, and provide tools to improve the information security status in organizations with a focus on public agencies. A central question for the project is how information security issues are communicated within the organizations, specifically underlining that communication is control in a cybernetic sen...
With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...
background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...
Medical Organization Information Security Management Based on ISO27001 Information Security Standard
Most of the information security events in medical organizations are due to improper management. This is a clear indication that the security of information is an issue related to information and communication technology and a management issue as well. In a review of literature, most research on information security has focused on information and communication technology issues, such as network...
0
Users who downloaded this article also downloaded: Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),"Formalizing information security requirements", Information Management & Computer Security, Vol. 9 Iss 1 pp. 32-37 Dieter Fink, (1994),"A Security Framework for Information Systems Outsourcing", Information Management & Computer Security, Vol. 2 Iss 4 pp. 3-8 Kevin J. Fitzgerald,...
This paper explores whether a relationship exists between the Certified Information Systems Security Professional (CISSP) certification and digital forensics. The key findings show that the CISSP Common Body of Knowledge (CBK) covers a wide spectrum of information security practices, processes, and procedures and that the CISSP certification can provide a basic introduction to digital forensic ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید