Results 11 to 20 of about 2,199,649 (286)

Practical Methods for Information Security Risk Management [PDF]

open access: yesInformatică economică, 2011
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj   +4 more sources

Information security management [PDF]

open access: yesInternational Journal of Cyber Warfare and Terrorism, 2013
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur?
José Martins   +3 more
  +7 more sources

Information Security Management [PDF]

open access: yesHOLISTICA – Journal of Business and Public Administration, 2020
Abstract Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach.
Sri Harsha Somepalli   +2 more
openaire   +2 more sources

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

Corporate information security management [PDF]

open access: yesNew Library World, 1999
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security ...
Mitchell, Ruth C.   +2 more
openaire   +2 more sources

Security information management systems [PDF]

open access: yesManagement Sciences, 2020
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire   +1 more source

Formation of a knowledge base to analyze the issue of transport and the environment [PDF]

open access: yesCaspian Journal of Environmental Sciences, 2020
The environmental impact of transport is significant because transport is a significant user of energy, and burns most of the world's petroleum. This issue creates air pollution, including nitrous oxides and particulates, and is a substantial contributor
Ilyas Idrisovich Ismagilov   +4 more
doaj   +1 more source

Information Security Risk Management [PDF]

open access: yes, 2017
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent security attacks, overlooking social and organizational threats and the risks faced because of them.
Dashti, Salimeh   +2 more
openaire   +1 more source

MM-ConvBERT-LMS: Detecting Malicious Web Pages via Multi-Modal Learning and Pre-Trained Model

open access: yesApplied Sciences, 2023
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection ...
Xin Tong   +5 more
doaj   +1 more source

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

Home - About - Disclaimer - Privacy