Results 281 to 290 of about 8,813,848 (351)
Some of the next articles are maybe not open access.

WLAN Security Management

2008
In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN.
Göran Pulkkis   +2 more
openaire   +1 more source

Managing for Enterprise Security

2004
Security has become one of the most urgent issues for many organizations. It is an essential requirement for doing business in a globally networked economy and for achieving organizational goals and mission. But it is no small task. The technical and environmental complexity of today's organizations and the ever-increasing dependence on technology to ...
Julia H. Allen   +4 more
openaire   +2 more sources

Managing the Secure Software Development

2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019
Nowadays, software development is a more complex process than ever was and it faces the challenges, where security became one of the most crucial. The security issues became an essential part of software engineers and understanding the vulnerabilities, risks and others became the everyday bread. The needs of security in software development resulted in
Fujdiak, Radek   +6 more
openaire   +2 more sources

Corporate Security and the Stratum of Security Management

2014
Security is unpredictable, encompassing multidimensional heterogeneous occupations, skills, and knowledge (Brooks, 2010). The security domain encompasses many parts across its broad spectrum of practice, such as national security, public security, and private security to name only a few.
David J Brooks, Jeffrey Corkill
openaire   +2 more sources

The Management of Security

2001
So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure.
openaire   +2 more sources

Managing the Risks of Managed Security Services

Information Systems Security, 2006
Abstract The information security industry has been around for quite a while, but only in the past decade has it matured and become a widespread practice throughout commerce. As the information security industry matures and grows, the application of certain economic principles becomes apparent, such as economies of scale.
openaire   +2 more sources

Information Security Management

2005
Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security ...
openaire   +1 more source

The management of security incidents by private security

African Security Review, 2015
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy.
openaire   +2 more sources

Managing IS Security and Privacy

2009
The concept of privacy has received attention for over a century now and its definition?let alone, understanding?has been profoundly challenging. This is primarily attributed to the “incompatible” and rich set of characteristics privacy comprises. As Brunk (2002) states very sharply, “Privacy is a matter of intellectual and philosophical thought and ...
openaire   +1 more source

Cyberinsurance in IT Security Management

IEEE Security & Privacy Magazine, 2007
Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security investments that reduce risk. Although cyberinsurance has evolved, industry has been slow to adopt it as a risk management tool.
A. Parkinson, W.S. Baer
openaire   +2 more sources

Home - About - Disclaimer - Privacy