Results 1 to 10 of about 2,199,649 (286)
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe +4 more
doaj +2 more sources
Vox2Face: Speech-Driven Face Generation via Identity-Space Alignment and Diffusion Self-Consistency
Speech-driven face generation aims to synthesize a face image that matches a speaker’s identity from speech alone. However, existing methods typically trade identity fidelity for visual quality and rely on large end-to-end generators that are difficult ...
Qiming Ma +7 more
doaj +1 more source
Integralus informacijos saugumo valdymo modelis
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj +1 more source
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed
Yejun Wu
doaj +1 more source
A Risk Management Process for Consumers [PDF]
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the ...
Cleeff, André van
core +2 more sources
Secure and Prepared Newsletter, February 11, 2010, Vol. 6, no. 4, revision 1 [PDF]
A bi-weekly newsletter for those involved in the fields of homeland security and/or emergency management.
core
Information Security Intelligence as a Basis for Modern Information Security Management
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective ...
Natalia Georgievna Miloslavskaya +1 more
doaj
Som Based Assurance Assessment for Information Security Management System in Organization [PDF]
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core
Comparing Blockchain Standards and Recommendations
Since the introduction of Bitcoin, the term “blockchain” has attracted many start-ups and companies over the years, especially in the financial sector. However, technology is evolving faster than standardization frameworks.
Lukas König +3 more
doaj +1 more source
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core

