Results 271 to 280 of about 14,261,936 (322)
Some of the next articles are maybe not open access.

Confidentiality and security of information

Anaesthesia & Intensive Care Medicine, 2010
Abstract Information about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as role-based access, legitimate relationships, and sealed envelopes, to ...
openaire   +2 more sources

Information security and the Internet

Information Management & Computer Security, 1995
Discusses the business vulnerabilities when using the Internet. Focuses on the logical barriers required to minimize these exposures. Explains why protection is required and discusses the role of firewalls as a “fire‐resistant” rather than “fire‐proof” security device.
openaire   +3 more sources

Information Security

2014
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire   +2 more sources

Telework Information Security

2005
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire   +1 more source

INFORMATION SECURITY & CYBER SECURITY

This book, Information Security & Cybersecurity: An Interdisciplinary Approach, would not have been possible without the valuable contributions of many individuals whose expertise, insight, and support have shaped its development. Each chapter in this book reflects the combined efforts of passionate professionals, thought leaders, and experts who are ...
openaire   +1 more source

Designing Information Security

2015
Previous chapters have emphasized that criminals and spies concentrate on financial account information, trade secrets, and internal organization data. This chapter is all about protecting information assets via the three goals of security, CIA: confidentiality, integrity, and availability.
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

Home - About - Disclaimer - Privacy