Results 1 to 10 of about 35,083 (135)

Evaluating the threat to national information security [PDF]

open access: yesProblems and Perspectives in Management, 2020
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development.
Hanna Yarovenko
doaj   +2 more sources

Exploring the Impact of AI-Based Cyber Security Financial Sector Management

open access: yesApplied Sciences, 2023
Cyber threats are attempts to secure unauthorized access to, change, or delete private information, to demand money from victims, or to disrupt business. Cybercrime includes everything from identity theft, malware threats, email and online fraud, to bank
Shailendra Mishra
doaj   +2 more sources

Characterization of security defects and analysis of vulnerability criticality in software for automated systems of internal affairs bodies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.Method.
I. G. Drovnikova, A. D. Popova
doaj   +2 more sources

Exploring the Techniques of Information Security Certification [PDF]

open access: yesarXiv.org, 2023
If the information system is intruded or attacked by hackers, leaked personal data or serious economic loss may occur; the threats may be serious security problems.
Abel C. H. Chen
semanticscholar   +1 more source

DEA-Analysis Of The Effectiveness Of The Country’s Information Security System [PDF]

open access: yesSocioEconomic Challenges, 2020
The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole.
Hanna Yarovenko   +2 more
doaj   +1 more source

Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +3 more
doaj   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

The Relationship between Information Security Awareness and the Intention to Violate Information Security with the Mediating Role of Individual Norms and Self-control [PDF]

open access: yesپژوهش‌های راهبردی مسائل اجتماعی ایران, 2019
Introduction: while the role of information in today’s world cannot be denied, and since most activities and processes depend on information, the violation of information security is a critical concern.
Hamid Reza Peikari, Babak Banazdeh
doaj   +1 more source

Security Model for a Central Bank in Latin America using Blockchain

open access: yesJournal of Internet Services and Information Security, 2023
Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization ...
R. Romero   +5 more
semanticscholar   +1 more source

IDENTIFICATION OF THREATS TO FINANCIAL INSTITUTIONS’ ECONOMIC SECURITY AS AN ELEMENT OF THE STATE FINANCIAL SECURITY REGULATION [PDF]

open access: yesBaltic Journal of Economic Studies, 2018
Government structures should start financial security regulation at the macro-level with the definition of a list of threats, which impact on participants in the financial market can destabilize their activities and lead to negative trends in the ...
Nataliia Zachosova, Nataliia Babina
doaj   +1 more source

Home - About - Disclaimer - Privacy