Results 261 to 270 of about 14,261,936 (322)
Some of the next articles are maybe not open access.
A Novel Information Security Model for Securing Information Systems
Applied Mechanics and Materials, 2014Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ...
openaire +2 more sources
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness.
Marianne Loock+2 more
openaire +2 more sources
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness.
Marianne Loock+2 more
openaire +2 more sources
Computer And Information Security Handbook
, 2016Thank you for reading computer and information security handbook. Maybe you have knowledge that, people have look hundreds times for their chosen readings like this computer and information security handbook, but end up in infectious downloads.
semanticscholar +1 more source
This presentation provides insights into information security by UZH's Chief Information Security Officer, Oli Schmid.
openaire +1 more source
openaire +1 more source
Information Security Management
2005Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security ...
openaire +1 more source
Is information security an oxymoron?
IEEE Aerospace and Electronic Systems Magazine, 1998Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems.
openaire +2 more sources
Information security policies’ compliance: a perspective for higher education institutions
Journal of Computational Information Systems, 2020Sadaf Hina, P. Dhanapal, Durai Dominic
semanticscholar +1 more source
College students information security awareness: a comparison between smartphones and computers
Education and Information Technologies : Official Journal of the IFIP technical committee on Education, 2020Nashrawan Taha, Laila Dahabiyeh
semanticscholar +1 more source
What *is* information security?
Proceedings of the 35th SIGCSE technical symposium on Computer science education, 2004Recent events have increasingly focused public attention on issues of information privacy, computer and network security, cybercrime and cyber terrorism. Yet despite all of this attention, there is some confusion about what is actually encompassed by those terms. There are some obvious components, such as cryptography and access control.
openaire +2 more sources
Information Security and Information Security Governance [PDF]
R von Solms, S.H. von Solms
openaire +1 more source