Results 21 to 30 of about 1,942,206 (195)

Mathematical model as means of optimization of the automation system of the process of incidents of information security management

open access: yesБезопасность информационных технологий, 2018
Modern information technologies have an increasing importance for development dynamics and management structure of an enterprise. The management efficiency of implementation of modern information technologies directly related to the quality of ...
Yulia G. Krasnozhon
doaj   +1 more source

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network

open access: yesIEEE Access, 2018
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng   +4 more
doaj   +1 more source

Modeling the information security management system (ISMS) of a medical organization [PDF]

open access: yesE3S Web of Conferences, 2020
The implementation of information security systems is one of the main components, without which the existence of any modern medical institution is impossible. This question is actual for the healthcare industry. This is confirmed by the presence of large-
Safonova O.M., Kotelnikov N.V.
doaj   +1 more source

Создание документации для систем управления информационной безопасностью [PDF]

open access: yes, 2015
Запропоновано нову систему створення документації для систем управління інформаційною безпекою, що відображає особливості, притаманні системам управління інформаційної безпеки організації.
Kozhedub, Yuliya   +1 more
core   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Research on the Construction of Smart City Information Security Assurance System under the Big Data Environment

open access: yesZhishi guanli luntan, 2021
[Purpose/significance] The information security problems faced by smart cities under the big data environment are becoming more and more prominent.
Zou Kai   +3 more
doaj   +1 more source

DEVELOPMENT OF INTELLIGENT METHODS FOR DETECTING NETWORK HAZARDOUS IMPACT AND PENETRATION BASED ON ANALYSIS OF THE BEHAVIORAL CHARACTERISTICS OF THE PROTECTED INFORMATION-CONTROL SYSTEM

open access: yesСовременная наука и инновации, 2022
The article discusses the problems of protecting the network infrastructure in the energy sector from various threats associated with external attacks (dangerous influences and intrusions).
E. P. Grabchak, E. L. Loginov
doaj   +1 more source

Ensuring the security of state information systems in conditions of uncertainty

open access: yesБезопасность информационных технологий, 2020
The paper addresses issues related to information security of information systems (IS). The Relevance of the work is primarily due to the fact that the number of cyber-attacks on various sectors of the Russian economy is not decreasing, but keeps growing
Grigory P. Gavdan, Rustem V. Penerdji
doaj   +1 more source

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

The Effect of the Implementation of Information Security Management System (ISMS) and Information Technology Infrastructure Library (ITIL) on the Promotion of Information Systems and Information Technology Services Continues [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2019
The purpose of this study was to investigate and analyze the factors affecting the upgrading of information systems and the continues of information technology services.
Ahmad Salehi, Zahra Vazife
doaj   +1 more source

Home - About - Disclaimer - Privacy