Results 31 to 40 of about 251,419 (115)

Access control model in ICS

open access: yesБезопасность информационных технологий
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS).
Muhannad O. Zaid Alkilani   +1 more
doaj   +1 more source

Transformations to achieve the Sustainable Development Goals Includes the SDG Index and Dashboards. Sustainable Development Report 2019 [PDF]

open access: yes, 2019
The Sustainable Development Report 2019 presents an updated SDG Index and Dashboards with a refined assessment of countries’ distance to SDG targets. The report has been successfully audited for the first time by the European Commission Joint Research ...
Fuller, G.   +4 more
core  

The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

open access: yes, 2009
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Developing Digital Banking Products and Technologies in the Context of Economic Security of Banks: Managerial and Information-Analytical Aspects

open access: yesСтатистика України
The article reveals the impact of digital transformation on the efficiency of management of financial and operational risks, and on the resilience of the Ukrainian banking system.
T. H. Bondaruk, O. S. Bondaruk
doaj   +1 more source

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

open access: yesThe Journal of The British Blockchain Association, 2019
This research has two parts; the first is to identify enterprise Hyperledger Fabric (HLF) blockchain cybersecurity vulnerabilities, threats, and legal obligations in a Post-Quantum Cryptography (PQC) world.
Robert Campbell
doaj   +1 more source

Characterization of security defects and analysis of vulnerability criticality in software for automated systems of internal affairs bodies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.Method.
I. G. Drovnikova, A. D. Popova
doaj   +1 more source

Does “See Something, Say Something” Work? [PDF]

open access: yes, 2018
Do “See Something, Say Something” programs work? The evidence strongly suggests that in the specific case of public surface transportation, the answer is “yes.” Transport staff and passengers play an important role in the prevention of terrorist attacks.
Butterworth, Bruce R.   +1 more
core   +1 more source

Risk Management Guide for Information System Infrastructure in Digital Banking

open access: yesJournal of Innovation Information Technology and Application
Digital banks rely heavily on IT infrastructure to support digital services, data management, and transaction processing, making them vulnerable to risks such as system failures, cybersecurity threats, and regulatory compliance.
Raden Budiraharjo   +3 more
doaj   +1 more source

Global Health Security in an Era of Explosive Pandemic Potential [PDF]

open access: yes, 2017
Pandemics pose a significant risk to security, economic stability, and development. Annualized expected losses from pandemics are estimated at $60 billion per year. Despite the certainty and magnitude of the threat, the global community has significantly
Ayala, Ana, Gostin, Lawrence O.
core   +1 more source

Home - About - Disclaimer - Privacy