Results 51 to 60 of about 266,507 (244)

Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Information security, is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access to data, unlawful use, disclosure, disruption. This
Amar Y. El-Bably
doaj   +1 more source

Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update

open access: yesInternational Journal on Cybernetics & Informatics, 2023
The risk of data theft has increased significantly over the past years. As a consequence, overwhelming damage is caused to institutions and private persons, respectively.
M. Mundt, Harald Baier
semanticscholar   +1 more source

Cardiovascular Prevention and Rehabilitation for Ischaemic Non‐Obstructive Coronary Artery Disease: Implementation Considerations From a Survey of UK Health Professionals

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aims Investigate if UK healthcare professionals have the resources and knowledge to provide cardiovascular prevention and rehabilitation to people with ischaemic non‐obstructive coronary artery disease (INOCA), and explore what type of care healthcare professionals believe patients should receive. Design Electronic cross‐sectional survey of UK
Simon Nichols   +5 more
wiley   +1 more source

SGSI project at CNAF [PDF]

open access: yesEPJ Web of Conferences, 2019
The Italian Tier1 center is mainly focused on LHC and physics experiments in general. Recently we tried to widen our area of activity and established a collaboration with the University of Bologna to set-up an area inside our computing center for hosting
Chierici Andrea   +9 more
doaj   +1 more source

KAMI index as an evaluation of academic information system security at XYZ university

open access: yesMatrix: Jurnal Manajemen Teknologi dan Informatika, 2021
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community.
Andi Sofyan Anas   +3 more
doaj   +1 more source

ANALISIS SISTEM KEAMANAN INFORMASI BERDASARKAN PENDEKATAN ISO/IEC 27001:2013 (Studi Kasus : Laboratorium Teknik Informatika Universitas Pasundan Bandung) [PDF]

open access: yes, 2018
Informasi merupakan hal yang sangat penting bagi organisasi. Pengelolaan yang baik diperlukan karena informasi merupakan aset yang sangat bernilai. Jika hal tersebut diakses oleh pihak yang tidak berhak maka dapat berpengaruh terhadap keberlangsungan ...
Rizka Tri Anugrah, 13.304.0219
core  

Information Technology Security Audit at the YDSF National Zakat Institution Using the ISO 27001 Framework

open access: yesJurnal Sisfokom (Sistem Informasi dan Komputer)
In this era of cyber crimes, data security is an important aspect that needs special attention from an organization. This is reinforced by the ratification of Law Number 27 of 2022 on personal data security.
Mustafa Kamal   +6 more
semanticscholar   +1 more source

Public Health Nurses' Time Allocation in Local Government Nursing Settings: A Self‐Reported Prospective Time Study

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda   +10 more
wiley   +1 more source

Uma metodologia para implantação de um Sistema de Gestão de Segurança da Informação (SGSI) baseado nas normas ABNT NBR ISO/IEC 27001 e 27002

open access: yesRevista Principia, 2013
A segurança da informação destaca-se como uma das principais preocupações em diversas organizações. Para garantir que as informações e os sistemas de informações estejam protegidos contra ameaças de todos os tipos é necessário definir processos ...
Ricardo Ribeiro Mendes   +3 more
doaj   +1 more source

Automate ISO 27001 Compliance

open access: yes, 2021
Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management, and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate ...
openaire   +1 more source

Home - About - Disclaimer - Privacy