Results 291 to 300 of about 8,813,848 (351)
Some of the next articles are maybe not open access.
Building an Effective Security Program for Distributed Energy Resources and Systems, 2016
II. Policy The most important element in maintaining a secure environment is the active participation of all faculty, staff, and students in recognizing, assessing and implementing realistic security measures to reduce unnecessary risks.
semanticscholar +1 more source
II. Policy The most important element in maintaining a secure environment is the active participation of all faculty, staff, and students in recognizing, assessing and implementing realistic security measures to reduce unnecessary risks.
semanticscholar +1 more source
IEEE Security and Privacy Magazine, 2006
The University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP (which shouldn't be confused with the Institute for Information Infrastructure Protection, or I3P) sought to close the gap between the current corporate cybersecurity risk profile ...
L. Kiely, Terry Benzel
openaire +2 more sources
The University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP (which shouldn't be confused with the Institute for Information Infrastructure Protection, or I3P) sought to close the gap between the current corporate cybersecurity risk profile ...
L. Kiely, Terry Benzel
openaire +2 more sources
Network Security, 2003
Have your systems been configured to write events to the system logs? Most people would answer ''Yes''. Are they using the standard default settings? The answer to this will vary. How often are the logs examined? Most people would answer only ''when there is a problem''.
openaire +2 more sources
Have your systems been configured to write events to the system logs? Most people would answer ''Yes''. Are they using the standard default settings? The answer to this will vary. How often are the logs examined? Most people would answer only ''when there is a problem''.
openaire +2 more sources
2016
How would you feel if your laptop or tablet were stolen, with your files and data on board, including shopping logins and passwords, financial details, and personal photos? Worse, how would you feel if you didn’t have a password on your PC, or if that password were easily guessable?
openaire +2 more sources
How would you feel if your laptop or tablet were stolen, with your files and data on board, including shopping logins and passwords, financial details, and personal photos? Worse, how would you feel if you didn’t have a password on your PC, or if that password were easily guessable?
openaire +2 more sources
2000
The focus of our previous chapters was on concurrency control related issues arise in MLS DBS environment. In this chapter, we shift our attention to another important transaction processing component, namely, buffer management. Since transactions of various security clearance levels often share the buffer pool, there arise the possibility of ...
Vijay Atluri+2 more
openaire +2 more sources
The focus of our previous chapters was on concurrency control related issues arise in MLS DBS environment. In this chapter, we shift our attention to another important transaction processing component, namely, buffer management. Since transactions of various security clearance levels often share the buffer pool, there arise the possibility of ...
Vijay Atluri+2 more
openaire +2 more sources
2017
In previous chapters we laid out the framework to capture the body of knowledge for (a) determining the required risk resilience level for the business using the business engagement model; (b) identifying and developing a road map of secured business capabilities with the secured business model; and (c) assessing, planning, and enabling people, process,
Neelesh Ajmani, Dinesh Kumar
openaire +2 more sources
In previous chapters we laid out the framework to capture the body of knowledge for (a) determining the required risk resilience level for the business using the business engagement model; (b) identifying and developing a road map of secured business capabilities with the secured business model; and (c) assessing, planning, and enabling people, process,
Neelesh Ajmani, Dinesh Kumar
openaire +2 more sources
Cloud Security: A Security Management Perspective
2017This chapter discusses, on strategic level, security considerations related to moving to the cloud. It starts by discussing common cloud threats with brief explanation of each of them. The next section discusses the detailed differences between the cloud and classical data-center in terms of security.
openaire +2 more sources
2013
Today, when most companies and government agencies rely on computer networks to store and manage their organizations’ data, it is essential that measures are put in place to secure those networks and keep them functioning optimally. Network administrators need to define their security management systems to cover all parts of their computer and network ...
openaire +2 more sources
Today, when most companies and government agencies rely on computer networks to store and manage their organizations’ data, it is essential that measures are put in place to secure those networks and keep them functioning optimally. Network administrators need to define their security management systems to cover all parts of their computer and network ...
openaire +2 more sources