نتایج جستجو برای: critical security studies
تعداد نتایج: 1986502 فیلتر نتایج به سال:
While security has long been a significant issue in military systems, the spread of the internet has stimulated a growing interest in, and increasing demand for, secure systems. Understanding how architects manage security requirements in practice is a necessary first step in providing repeatable processes using effective techniques, methods and architectural structures. We present the results ...
Although trust is recognized as important in security issues of computer networking environments, few studies on information systems deal with both trust and security, and those existing tend to remain within the short perimeter of two-agent interactions. We propose to rethink trust research on information system security by considering the holistic approach of critical infrastructure protectio...
A critical infrastructure consists of basic assets and facilities whose functioning has a significant impact on the society economy country, as well its security. The life work citizens country are largely dependent smooth operation various energy, telecommunication, water sewage facilities, network hospitals health institutions, transportation, etc. safe these systems is prerequisite for exist...
Studies have shown that smaller businesses are less likely to have extensive security in place because of the false sense of safety being small. What is more worrying is that small businesses are being attacked more frequently in today’s environment. Since protective measures often require significant managerial vigilance, an appropriate level of awareness and concern among managers may be a pr...
during the process of reading, sometimes learners use ineffective and inefficient strategies and some factors may influence their use of strategies. perhaps critical thinking is one of these factors. this study aims to identify those categories of reading strategies that are mostly used by iranian efl learners and to see if there is any significant relationship between the critical thinking abi...
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید