Results 211 to 220 of about 365,185 (272)
Computer Security Threats Towards the E-Learning System Assets
E-learning system is a web-based system which is exposed to computer threats. Services or asset of the e-learning system must be protected from any computer threats to ensure the users have peace of mind when using it. It is important to identify and understand the threats to the system in order develop a secure system.
Zainal Fikri Zamzuri+3 more
semanticscholar +4 more sources
Computer Security: Planning to Protect Corporate Assets
The author describes the strengths and weaknesses of current systems and reveals how planning can preempt a breach in security.
Melvin M. Schwartz
openalex +4 more sources
Protecting information assets through effective computer security training
Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology ...
Walsh
openalex +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA), 2023
This paper designs a new integrated software management system based on cloud computing architecture based on computer cloud security database technology.
Chen Ming+4 more
semanticscholar +1 more source
This paper designs a new integrated software management system based on cloud computing architecture based on computer cloud security database technology.
Chen Ming+4 more
semanticscholar +1 more source
International Journal of Systems and Software Security and Protection, 2022
Cloud computing is an emerging computing paradigm that replaces computing as a personal asset with computing as a public service. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, and convenience,
Chaima Boulifi, M. Jouini
semanticscholar +1 more source
Cloud computing is an emerging computing paradigm that replaces computing as a personal asset with computing as a public service. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, and convenience,
Chaima Boulifi, M. Jouini
semanticscholar +1 more source
Market‐inspired framework for securing assets in cloud computing environments
Software: Practice and Experience, 2022AbstractSelf‐adaptive security methods have been extensively leveraged for securing software systems and users from runtime threats in online and elastic environments, such as the cloud. The existing solutions treat security as an aggregated quality by enforcing “one service for all” without considering the explicit security requirements of each asset ...
Giannis Tziakouris+4 more
openaire +2 more sources
2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), 2020
Many information assets have been exposed to threats as a result of business owners not having access to an efficient model for classifying their information assets into appropriate security risk levels, required level of protection and priority.
C. Y. Alonge+5 more
semanticscholar +1 more source
Many information assets have been exposed to threats as a result of business owners not having access to an efficient model for classifying their information assets into appropriate security risk levels, required level of protection and priority.
C. Y. Alonge+5 more
semanticscholar +1 more source
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 2022
The use of “electronic healthcare technology” is widespread, and it has huge potential to improve “clinical outcomes and transform” how therapy is administered. On the other hand, medical device and information security is becoming a significant problem.
Prince Tehseen Ganai+5 more
semanticscholar +1 more source
The use of “electronic healthcare technology” is widespread, and it has huge potential to improve “clinical outcomes and transform” how therapy is administered. On the other hand, medical device and information security is becoming a significant problem.
Prince Tehseen Ganai+5 more
semanticscholar +1 more source
Usage of Classifier Ensemble for Security Enrichment in IDS
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS), 2022The success of the web and the consequent rise in data sharing have made network security a challenge. Attackers from all around the world target PC installations. When an attack is successful, an electronic device's security is jeopardised.
Ch. Phaneendra Varma+3 more
semanticscholar +1 more source