Results 291 to 300 of about 2,067,027 (330)
Some of the next articles are maybe not open access.
International Workshop on Big Data and Information Security, 2018
The data center needs a protection both physically and logically to secure information system from any security attacks. Any information security threats like stealing of information, denial of service and unauthorized access can cause an adverse impact ...
Dedy Achmadi, Y. Suryanto, K. Ramli
semanticscholar +1 more source
The data center needs a protection both physically and logically to secure information system from any security attacks. Any information security threats like stealing of information, denial of service and unauthorized access can cause an adverse impact ...
Dedy Achmadi, Y. Suryanto, K. Ramli
semanticscholar +1 more source
The automating process of information security management
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2018This article is devoted to the review and analysis of existing methods for ensuring information security of automated systems for the banking sector. Strengths and weaknesses were investigated.
S. Sokolov+4 more
semanticscholar +1 more source
Information security management and the human aspect in organizations
Information and Computer Security, 2017The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar +1 more source
Information Security Management
Security Management for Healthcare, 2019Курс посвящен современным передовым методам организации работы служб информационной безопасности Организаций на основе библиотеки передового опыта ITIL (IT Infrastructure Library) и международного стандарта ISO/IEC 17799 (Информационные технологии ...
Harold F. Tipton
semanticscholar +2 more sources
Towards Automation in Information Security Management Systems
International Conference on Software Quality, Reliability and Security, 2017Establishing and operating an Information Security Management System (ISMS) to protect information values and information systems is in itself a challenge for larger enterprises and small and medium sized businesses alike.
M. Brunner, Christian Sillaber, R. Breu
semanticscholar +1 more source
Factor analysis on information security management in higher education institutions
2016 4th International Conference on Cyber and IT Service Management, 2016Information security has become an important thing for any organization because of information technology adoption, including for higher education institutions.
P. Sari+2 more
semanticscholar +1 more source
Analyzing Human Factors for an Effective Information Security Management System
, 2016Managing security is essential for organizations doing business in a globally networked environment and for organizations that are at the same time seeking to achieve their missions and goals.
Reza Alavi
semanticscholar +1 more source
An integrated system for information security management with the unified framework
, 2016Information security management plays an essential role for drawing the roadmap of information security; thus, many theoretical methodologies and practical standards are brought into this domain.
Tsung-Han Yang, C. Ku, Man-Nung Liu
semanticscholar +1 more source
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale
IEEE Security and Privacy, 2015According to conventional wisdom, information security management must start with a quantitative risk analysis. Such an analysis works fine in theory, but it hardly works in practice.
R. Oppliger
semanticscholar +1 more source
Identifying factors of "organizational information security management"
Journal of Enterprise Information Management, 2014Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets.
A. Singh, M. Gupta, Amitabh Ojha
semanticscholar +1 more source