• Nenhum resultado encontrado

Management of information security

SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT SOLUTIONS) IMPLEMENTATIONS IN PRIVATE OR PUBLIC CLOUDS

SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT SOLUTIONS) IMPLEMENTATIONS IN PRIVATE OR PUBLIC CLOUDS

... Today’s security threats are dynamic in nature and exploits are constantly ...threatsand security events evolve, SIEM vendors and the information securitycommunity must work together to build ...

4

INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES

INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES

... centralizing security by utilizing the identity and access management ...sequence of steps to achieve efficiency and automation is the fundamental requirement in workflow ...access management ...

20

INFORMATION SECURITY AS PART OF THE OVERALL CORPORATE GOVERNANCE – IT GOVERNANCE

INFORMATION SECURITY AS PART OF THE OVERALL CORPORATE GOVERNANCE – IT GOVERNANCE

... end of the last century was a decisive moment in the evolution and modernization of the corporate governance concept, as a part of scientific ...importance of such a system that works well ...

11

1. Adoption of Information Systems Security Policies Nowadays, Information Systems Security (ISS) is a critical issue for a wide range of organizations. The centrality of information in the operations and management of organizations raises concerns regard

1. Adoption of Information Systems Security Policies Nowadays, Information Systems Security (ISS) is a critical issue for a wide range of organizations. The centrality of information in the operations and management of organizations raises concerns regard

... views of it as the number of authors who address the topic (Jӧnsson ...concerns of people in an immediate problematic situation and to the goals of social science by joint collaboration within ...

9

Structure Of Management Information In SNMP

Structure Of Management Information In SNMP

... consists of three sections msgGlobalData (header), msgSecurityParameters and msgData ...the security model in use. SNMPv3 defines USM as a security model of choice but vendors are free to ...

4

THE INFORMATION BEHAVIOR OF INFORMATION SECURITY AND CRYPTOGRAPHY PROFESSIONALS: HOW THESE PROFESSIONALS SEEK AND USE INFORMATION

THE INFORMATION BEHAVIOR OF INFORMATION SECURITY AND CRYPTOGRAPHY PROFESSIONALS: HOW THESE PROFESSIONALS SEEK AND USE INFORMATION

... case of professionals who work with medium and long-term project development, the searches occur with greater intensity in the initial phases of the pro- ...nation of information with the ...

11

An information-theoretic approach to side-channel analysis

An information-theoretic approach to side-channel analysis

... presence of end-to-end encryption of packet contents and headers; ...focus of security attacks is shifting towards ...part of the Internet infrastructure and are used for tasks ranging ...

108

A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

... sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every ...where ...

12

AUDITING THE SECURITY OF INFORMATION SYSTEMS WITHIN AN ORGANIZATION

AUDITING THE SECURITY OF INFORMATION SYSTEMS WITHIN AN ORGANIZATION

... that of damaging the company reputation as a result of a security breach and therefore affecting the client/business partner ...Therefore, information loss and contamination has become an ...

5

INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP

INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP

... most of the departments and processes of a business ...scope of the certification in the statement of purpose ...establishment of an information security policy that ...

25

Security threats management in android systems

Security threats management in android systems

... price of information has become of great deal and so an increased effort is made in developing better security ...scale security incidents still require an effective solution ...all ...

86

Security Management System for 4G Heterogeneous Networks

Security Management System for 4G Heterogeneous Networks

... build security management systems for 4G heterogeneous ...a security management system which detects if the mobile device has been attacked and prevents using it as an attack tool by removing ...

5

Decision support for selecting information security controls

Decision support for selecting information security controls

... (2016), Information Security is a very important aspect in which organizations must ...on Information Security Management Systems (ISMS), an approach that can establish, implement, ...

82

Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005

Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005

... on information technology and information systems to successfully carry out their missions and business ...functions. Information systems are subject to serious threats that can have adverse effects ...

5

NTELLIGENT INFORMATION SYSTEMS. AN IMPORTANT AID TO NATIONAL SECURITY

NTELLIGENT INFORMATION SYSTEMS. AN IMPORTANT AID TO NATIONAL SECURITY

... Process Management is focused on managing change and improves business ...Process Management integrates different disciplines such as process modeling, simulation, workfl ow, Enterprise Application ...

4

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

... Cloud security covers several ...cloud security issues, addressing vulnerabilities, threats, and ...understand security risks, the authors identify the basic concepts underlying vulnerabilities and ...

12

INFORMATION SYSTEMS SECURITY POLICIES: A SURVEY IN PORTUGUESE PUBLIC ADMINISTRATION

INFORMATION SYSTEMS SECURITY POLICIES: A SURVEY IN PORTUGUESE PUBLIC ADMINISTRATION

... number of studies focusing on security policies in the ISS research ...adoption of security ...inexistence of a coherent theory about security policies [Hong et ...expression ...

9

Master Management Information Systems

Master Management Information Systems

... upgrade of new products in terms of function, quality and consistency, taking the market trends and customers ...activities of developing and upgrading the methodology of the organization´s ...

46

CONFLUENCE OF KNOWLEDGE BETWEEN INFORMATION SCIENCE AND MANAGEMENT: INTERDISCIPLINARY MANAGEMENT

CONFLUENCE OF KNOWLEDGE BETWEEN INFORMATION SCIENCE AND MANAGEMENT: INTERDISCIPLINARY MANAGEMENT

... constitution of Information Science and Management, which explores interdisciplinarity between these two fields of knowledge, with the confluence points of the strategic ...

19

Cad. Saúde Pública  vol.29 número4

Cad. Saúde Pública vol.29 número4

... speed of technological progress has rendered various forms of legal tutorship rap- idly obsolete, and the more recent strategy has focused less on purely technological data and more on other normative ...

3

Show all 10000 documents...

temas relacionados