Results 51 to 60 of about 290,825 (260)

Цикл впровадження системи управління інформаційною безпекою [PDF]

open access: yes, 2006
Розглядається цикл впровадження системи управління інформаційною безпекою відповідно до ISO/IEC 27001:2005(E).The cycle of introduction of the Information Security Management System is examined, in accordance with ISO/IEC 27001:2005(E)
Безштанько, Віталій
core  

Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi

open access: yesCyber Security dan Forensik Digital
Perpustakaan Nasional RI (Perpusnas) merupakan sebuah institusi yang menyimpan dan mengelola informasi dan pengetahuan nasional, harus memastikan bahwa teknologi informasi yang digunakan dalam operasinya aman dan terlindungi dari serangan siber dan ...
Moh. Abdul Fattah Ys   +2 more
semanticscholar   +1 more source

Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update

open access: yesInternational Journal on Cybernetics & Informatics, 2023
The risk of data theft has increased significantly over the past years. As a consequence, overwhelming damage is caused to institutions and private persons, respectively.
M. Mundt, Harald Baier
semanticscholar   +1 more source

Evaluating Neurodevelopmental Sequelae of Propranolol Use in Infantile Hemangioma: A Large‐Scale Population‐Based Study

open access: yesJEADV Clinical Practice, EarlyView.
ABSTRACT Background Propranolol is widely adopted as the first‐line treatment for problematic infantile hemangioma (IH). Despite its efficacy and widespread use, concerns persist about potential long‐term neurodevelopmental risks, given propranolol′s ability to cross the blood‐brain barrier during early development. Objectives To evaluate the long‐term
Khalaf Kridin   +3 more
wiley   +1 more source

ISO 27001 Information Security Survey of Medical Service Organizations

open access: yesEngineering Proceedings, 2023
The differences between medical institutions in the security management of information systems were investigated by comparing the differences and the means used by personnel in different units in public and private hospitals.
Hung-Hsiou Hsu, Jyun-Rong Shih
doaj   +1 more source

PENGUKURAN TINGKAT KEPEDULIAN KARYAWAN TERHADAP KEAMANAN LINGKUNGAN KERJA BERDASARKAN ISO 27001:2013 (STUDI KASUS: FAKULTAS TEKNIK UNIVERSITAS PASUNDAN) [PDF]

open access: yes, 2017
Kepedulian karyawan terhadap keamanan lingkungan kerja terkait dengan keamanan informasi merupakan poin atau titik awal untuk sumber daya manusia dalam memahami pengetahuan mengenai keamanan teknologi informasi.
ANDINI PRAMUDITA, 123040156   +2 more
core  

Information Security management: A human challenge? [PDF]

open access: yes, 2008
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core   +1 more source

Analisis Keamanan Fisik Data Prodi Sistem Informasi UIN Sumatera Utara Medan Menggunakan Standar ISO 27001

open access: yesJurnal Penelitian Dan Pengkajian Ilmiah Eksakta, 2023
Physical security is the first step in computer security. If physical storage is not properly secured, data, even the computer applications themselves, cannot be guaranteed to be secure. Analysis of Physical Data Security of the Information Systems Study
Hârun Yahya   +3 more
semanticscholar   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Pengukuran Manajemen Risiko Keamanan Aset Teknologi Informasi Menggunakan Metode FMEA Dan Framework ISO 27001:2013 pada PT. ABC

open access: yesJOINS (Journal of Information System)
PT. ABC merupakan perusahaan yang bergerak dibidang jasa pembiayaan seperti peralatan elektronik, rumah tangga, dan kendaraan. Ancaman pada perusahaan sektor jasa pembiayaan juga kerap menjadi perhatian, dikarenakan ancaman yang datang dapat merugikan ...
Ari Ferdinand   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy