Results 291 to 300 of about 8,813,848 (351)
Some of the next articles are maybe not open access.

Security Management

Building an Effective Security Program for Distributed Energy Resources and Systems, 2016
II. Policy The most important element in maintaining a secure environment is the active participation of all faculty, staff, and students in recognizing, assessing and implementing realistic security measures to reduce unnecessary risks.

semanticscholar   +1 more source

Systemic Security Management

IEEE Security and Privacy Magazine, 2006
The University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP (which shouldn't be confused with the Institute for Information Infrastructure Protection, or I3P) sought to close the gap between the current corporate cybersecurity risk profile ...
L. Kiely, Terry Benzel
openaire   +2 more sources

Security management

Encyclopedia of Sport Management, 2021
Janet M. Howes
semanticscholar   +1 more source

Security Log Management

Network Security, 2003
Have your systems been configured to write events to the system logs? Most people would answer ''Yes''. Are they using the standard default settings? The answer to this will vary. How often are the logs examined? Most people would answer only ''when there is a problem''.
openaire   +2 more sources

Managing Security and Privacy

2016
How would you feel if your laptop or tablet were stolen, with your files and data on board, including shopping logins and passwords, financial details, and personal photos? Worse, how would you feel if you didn’t have a password on your PC, or if that password were easily guessable?
openaire   +2 more sources

Secure Buffer Management

2000
The focus of our previous chapters was on concurrency control related issues arise in MLS DBS environment. In this chapter, we shift our attention to another important transaction processing component, namely, buffer management. Since transactions of various security clearance levels often share the buffer pool, there arise the possibility of ...
Vijay Atluri   +2 more
openaire   +2 more sources

Secured Management Model

2017
In previous chapters we laid out the framework to capture the body of knowledge for (a) determining the required risk resilience level for the business using the business engagement model; (b) identifying and developing a road map of secured business capabilities with the secured business model; and (c) assessing, planning, and enabling people, process,
Neelesh Ajmani, Dinesh Kumar
openaire   +2 more sources

Cloud Security: A Security Management Perspective

2017
This chapter discusses, on strategic level, security considerations related to moving to the cloud. It starts by discussing common cloud threats with brief explanation of each of them. The next section discusses the detailed differences between the cloud and classical data-center in terms of security.
openaire   +2 more sources

Security Management

Facilities Manager's Desk Reference 3e, 2020

semanticscholar   +1 more source

Security Management Systems

2013
Today, when most companies and government agencies rely on computer networks to store and manage their organizations’ data, it is essential that measures are put in place to secure those networks and keep them functioning optimally. Network administrators need to define their security management systems to cover all parts of their computer and network ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy