نتایج جستجو برای: internal security

تعداد نتایج: 406278  

2017
Lucio Silva Silvio Menezes Ana Paula Cabral Seixas Costa Ana Paula Cabral

This study presents a theoretical model to evaluate the level of information security in an organisational environment with a focus on the knowledge, attitudes and behaviour of the end-user, identifying the level and origin of the gap between the information security guidelines laid down by the company and the actual practices of its internal staff, third party partners and suppliers. The model...

2013
Jae-Kook Lee

Recently The internet is widely used. As a result, cyber attacks are continuously changed and increased. Various security systems are used to protect internal network, servers and PCs. The KISA(Krcert/CC) operates a variety of security systems to prevent and protect against cyber attacks. For example, there are systems for detecting and preventing DoS/DDoS attacks, managing cyber threats, trapp...

1998
Jussipekka Leiwo Chandana Gamage Yuliang Zheng

Harmonization of information security harmonization requirements is a process of transforming abstract information security objectives into concrete information security policies in an automated manner. The process is designed to also provide assurance from internal properties, such as consistency and correctness, of an requirement base, collection of information security requirements. Harmoniz...

2010
Walid AMMAR

1. Unified Beneficiaries Database In 2003, a unified Beneficiaries Database was created, including beneficiaries of the Ministry of Public Health (MOPH), National Social Security Fund (NSSF), Civil Servants Cooperative (CSC), Army, Internal Security Forces (ISF), General Security Forces (GSF) and State Security Forces (SSF). The unification of beneficiaries information implied that doublecovera...

2009
Timo Brecher Emmanuel Bresson Mark Manulis

We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from possible system crashes, network failures, and misbehavior of the protocol participants. We propose a fully robust GKE protocol using the novel tree replication technique: our basic protocol version ensures security again...

2012
Cyrill Osterwalder

Cyrill Osterwalder has been the privacy engineering lead at Google since 2010. His responsibilities at Google include ensuring that effective privacy controls are built into products and internal practices. Before Google, Cyrill was Vice President of the web application security division at Phion. Phion acquired the Web application security company Visonys in 2008 which Cyrill co-founded. Cyril...

Journal: :African Journal of Legal Studies 2023

Abstract Since Nigeria’s restoration to democracy in 1999, the country has never faced same level of internal security threat as it does now, including threats from Boko Haram rebels, herdsmen and bandits. This paper argued that problem insecurity Nigeria is a symptom failed state this can be remedied by adoption concept new approach international law which essentially entails enthroning regime...

Journal: :International Journal of Research In Business and Social Science 2022

This study argues that preservation of internal security Namibia should not be the primary responsibility only Namibian Police Force (NamPol). The issue has been subject interest throughout human existence and still reserves its principal occupation in public domain. However, challenges insecurities increased threats to domestically globally have triggered incessantly renewed inquiry by scholar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید