نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
This paper serves as part of an ongoing research project into the behaviour of the employee within the work environment regarding information security. Can an employee be audited, like the financial transactions or the information systems? The human factor is of vital importance to the security of information in the organization nowadays, and this element should also be investigated in order to...
In this paper we discuss on the security module for the car appliances to prevent stealing and illegal use on other cars. We proposed an open structure including authentication and encryption by embed a security module in each to protect car appliances. Illegal moving and use a car appliance with the security module without permission will lead the appliance to useless. This paper also presents...
Contemporary e-Business applications comprise of dynamic extensible and interoperable collection of services, Web Services and information shared by collaborating entities performing various transactional tasks. Securing these services offerings is therefore of crucial importance. To address security requirements, there has been a plethora of proposed solutions, ranging from hardware devices an...
The methods and results of a sophisticated application of probabilistic linkage to Social Security Administration administrative files is presented. The study objectives were to (1) identify persons issued more than one social security number, and (2) to identify twins. The methodology incorporates the procedures outlined in Newcombe's HANDBOOK OF RECORD LINKAGE. This study is believed to be on...
Understanding the capabilities and limitations of an operating system, its software installation and management procedures and how to configure and manage other system software is a key ingredient of keeping systems secure. This paper discusses the differences in system configuration, management and security between some of the most common versions of UNIX (Red Hat Linux, Solaris, HP-UX and AIX...
In response to the HIPAA privacy and security rules, organizations are taking steps to set up and clean up access controls, and explore possible changes to audit controls and termination procedures. They are facing the practical issues of implementing security policies that are compliant, efficient to administer, and not disruptive to users. Organizations are also setting up new users' system a...
The need for information security within small to mid-size companies is increasing. The risks of information security breach, data loss, and disaster are growing. The impact of IT outages and issues on the company are unacceptable to any size business and their clients. There are many ways to address the security for IT departments. The need to address risks of attacks as well as disasters is i...
Any endeavor worth pursuing is worth measuring, but software security presents new measurement challenges: there are no established formulas or procedures for quantifying the security risk present in a program. This document details the importance of measuring software security and discusses the less-thansatisfying approaches that are prevalent today. A new set of metrics is then proposed for e...
There are several standard approaches to risk analysis recommended for use in information security, however, the actual application of risk analysis by security analysts follows an opaque mix of standard risk analysis procedures and adaptations based on an analyst’s understanding of risk. We refer to these approaches as Folk Risk Analysis. To understand folk risk analysis, we present the result...
to evaluate and predict component-based software security, a two-dimensional model of software security is proposed by stochastic petri net in this paper. in this approach, the software security is modeled by graphical presentation ability of petri nets, and the quantitative prediction is provided by the evaluation capability of stochastic petri net and the computing power of markov chain. each...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید