Results 281 to 290 of about 8,813,848 (351)
Some of the next articles are maybe not open access.
2008
In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN.
Göran Pulkkis+2 more
openaire +1 more source
In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN.
Göran Pulkkis+2 more
openaire +1 more source
Managing for Enterprise Security
2004Security has become one of the most urgent issues for many organizations. It is an essential requirement for doing business in a globally networked economy and for achieving organizational goals and mission. But it is no small task. The technical and environmental complexity of today's organizations and the ever-increasing dependence on technology to ...
Julia H. Allen+4 more
openaire +2 more sources
Managing the Secure Software Development
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019Nowadays, software development is a more complex process than ever was and it faces the challenges, where security became one of the most crucial. The security issues became an essential part of software engineers and understanding the vulnerabilities, risks and others became the everyday bread. The needs of security in software development resulted in
Fujdiak, Radek+6 more
openaire +2 more sources
Corporate Security and the Stratum of Security Management
2014Security is unpredictable, encompassing multidimensional heterogeneous occupations, skills, and knowledge (Brooks, 2010). The security domain encompasses many parts across its broad spectrum of practice, such as national security, public security, and private security to name only a few.
David J Brooks, Jeffrey Corkill
openaire +2 more sources
2001
So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure.
openaire +2 more sources
So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure.
openaire +2 more sources
Managing the Risks of Managed Security Services
Information Systems Security, 2006Abstract The information security industry has been around for quite a while, but only in the past decade has it matured and become a widespread practice throughout commerce. As the information security industry matures and grows, the application of certain economic principles becomes apparent, such as economies of scale.
openaire +2 more sources
Information Security Management
2005Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security ...
openaire +1 more source
The management of security incidents by private security
African Security Review, 2015This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy.
openaire +2 more sources
Managing IS Security and Privacy
2009The concept of privacy has received attention for over a century now and its definition?let alone, understanding?has been profoundly challenging. This is primarily attributed to the “incompatible” and rich set of characteristics privacy comprises. As Brunk (2002) states very sharply, “Privacy is a matter of intellectual and philosophical thought and ...
openaire +1 more source
Cyberinsurance in IT Security Management
IEEE Security & Privacy Magazine, 2007Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security investments that reduce risk. Although cyberinsurance has evolved, industry has been slow to adopt it as a risk management tool.
A. Parkinson, W.S. Baer
openaire +2 more sources