Results 51 to 60 of about 290,825 (260)
Цикл впровадження системи управління інформаційною безпекою [PDF]
Розглядається цикл впровадження системи управління інформаційною безпекою відповідно до ISO/IEC 27001:2005(E).The cycle of introduction of the Information Security Management System is examined, in accordance with ISO/IEC 27001:2005(E)
Безштанько, Віталій
core
Perpustakaan Nasional RI (Perpusnas) merupakan sebuah institusi yang menyimpan dan mengelola informasi dan pengetahuan nasional, harus memastikan bahwa teknologi informasi yang digunakan dalam operasinya aman dan terlindungi dari serangan siber dan ...
Moh. Abdul Fattah Ys +2 more
semanticscholar +1 more source
Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update
The risk of data theft has increased significantly over the past years. As a consequence, overwhelming damage is caused to institutions and private persons, respectively.
M. Mundt, Harald Baier
semanticscholar +1 more source
ABSTRACT Background Propranolol is widely adopted as the first‐line treatment for problematic infantile hemangioma (IH). Despite its efficacy and widespread use, concerns persist about potential long‐term neurodevelopmental risks, given propranolol′s ability to cross the blood‐brain barrier during early development. Objectives To evaluate the long‐term
Khalaf Kridin +3 more
wiley +1 more source
ISO 27001 Information Security Survey of Medical Service Organizations
The differences between medical institutions in the security management of information systems were investigated by comparing the differences and the means used by personnel in different units in public and private hospitals.
Hung-Hsiou Hsu, Jyun-Rong Shih
doaj +1 more source
PENGUKURAN TINGKAT KEPEDULIAN KARYAWAN TERHADAP KEAMANAN LINGKUNGAN KERJA BERDASARKAN ISO 27001:2013 (STUDI KASUS: FAKULTAS TEKNIK UNIVERSITAS PASUNDAN) [PDF]
Kepedulian karyawan terhadap keamanan lingkungan kerja terkait dengan keamanan informasi merupakan poin atau titik awal untuk sumber daya manusia dalam memahami pengetahuan mengenai keamanan teknologi informasi.
ANDINI PRAMUDITA, 123040156 +2 more
core
Information Security management: A human challenge? [PDF]
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core +1 more source
Physical security is the first step in computer security. If physical storage is not properly secured, data, even the computer applications themselves, cannot be guaranteed to be secure. Analysis of Physical Data Security of the Information Systems Study
Hârun Yahya +3 more
semanticscholar +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
PT. ABC merupakan perusahaan yang bergerak dibidang jasa pembiayaan seperti peralatan elektronik, rumah tangga, dan kendaraan. Ancaman pada perusahaan sektor jasa pembiayaan juga kerap menjadi perhatian, dikarenakan ancaman yang datang dapat merugikan ...
Ari Ferdinand +5 more
doaj +1 more source

