Results 111 to 120 of about 373,921 (174)

Computer Security Threats Towards the E-Learning System Assets

open access: closedInternational Conference on Software Engineering and Computer Systems, 2011
E-learning system is a web-based system which is exposed to computer threats. Services or asset of the e-learning system must be protected from any computer threats to ensure the users have peace of mind when using it. It is important to identify and understand the threats to the system in order develop a secure system.
Zainal Fikri Zamzuri   +3 more
semanticscholar   +4 more sources

Computer Security: Planning to Protect Corporate Assets

open access: closedJournal of Business Strategy, 1990
The author describes the strengths and weaknesses of current systems and reveals how planning can preempt a breach in security.
Melvin M. Schwartz
openalex   +4 more sources

Protecting information assets through effective computer security training

open access: closedProceedings of IEEE International Carnahan Conference on Security Technology CCST-94, 1994
Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology ...
Walsh
openalex   +3 more sources

Research on Smart Power Grid Big Data Information Management System Based on Computer Cloud Security Database Technology

2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA), 2023
This paper designs a new integrated software management system based on cloud computing architecture based on computer cloud security database technology.
Chen Ming   +4 more
semanticscholar   +1 more source

Market‐inspired framework for securing assets in cloud computing environments

Software: Practice and Experience, 2022
AbstractSelf‐adaptive security methods have been extensively leveraged for securing software systems and users from runtime threats in online and elastic environments, such as the cloud. The existing solutions treat security as an aggregated quality by enforcing “one service for all” without considering the explicit security requirements of each asset ...
Giannis Tziakouris   +4 more
openaire   +2 more sources

Research on Computer Big Data Technology in Generative Countermeasures Network Security Protection

2022 IEEE International Conference on Electrical Engineering, Big Data and Algorithms (EEBDA), 2022
In order to make up for the shortcomings of the current network security situation assessment system, this article proposes a network security situation quantitative assessment algorithm based on the offensive and defensive confrontation environment ...
Yin Xuxi
semanticscholar   +1 more source

Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements

International Journal of Systems and Software Security and Protection, 2022
Cloud computing is an emerging computing paradigm that replaces computing as a personal asset with computing as a public service. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, and convenience,
Chaima Boulifi, M. Jouini
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy