نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

2009
Véronique Normand Edith Félix

As a long-term industrial initiative, we are developing a new method to support security risk analysis, closely integrated with the overall engineering process of our critical information systems. This method is building upon model-based engineering techniques. This paper presents a prototype domainspecific modelling language (DSML) that was developed in this context; this DSML aims at supporti...

2011
TARUN KUMAR

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission o...

2009
Marianne STONE

" Security is taken to be about the pursuit of freedom from threat and the ability of states and societies to maintain their independent identity and their functional integrity against forces of change, which they see as hostile. The bottom line of security is survival, but it also reasonably includes a subtstantial range of concerns about the conditions of existence. Quite where this range of ...

2013
Irfan Syamsuddin

Information security plays a significant role in recent information society. Increasing number and impact of cyber attacks on information assets have resulted the increasing awareness among managers that attack on information is actually attack on organization itself. Unfortunately, particular model for information security evaluation for management levels is still not well defined. In this stu...

2013
Kyle Papin-Ramcharan Simon Fraser

This paper investigates the effect of organizational characteristics on information security practices in Trinidad and Tobago. As a theoretical lens, this study relies on a hypothesized model derived from Chang and Wang (2010) to test 24 hypotheses relating to information security practices. The data was collected using online surveys and was analyzed using factor analysis and structured equati...

2008
Michael J. Huber Ali Sunyaev Helmut Krcmar

Based on ISO 27001 for Information Security Management Systems, this paper introduces a newly developed security analysis approach, suitable for technical security analyses in general. This approach is used for a security analysis of several components and processes of the Health Care Telematics in Germany. Besides the results of the analysis, basics for further analysis and verification activi...

2008
Yolanta Beres Jonathan Griffin Simon Shiu

In this paper we present a novel approach of using mathematical models and stochastic simulations to guide and inform security investment and policy change decisions. In particular, we investigate vulnerability management policies, and explore how effective standard patch management and emergency escalation based policies are, and how they can be combined with earlier, pre-patch mitigation meas...

Journal: :International Journal of Intelligent Computing Research 2012

Journal: :International Journal for Information Security Research 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید