CONCEPTUAL FOUNDATIONS OF POLITICAL AND LEGAL MECHANISMS FOR ENSURING INFORMATION SECURITY
نویسندگان
چکیده
منابع مشابه
technical and legal parameters for determination of river boundary,( case study haraz river)
چکیده با توسعه شهر نشینی و دخل و تصرف غیر مجاز در حریم رودخانه ها خسارات زیادی به رودخانه و محیط زیست اطراف آن وارده می شود. در حال حاضر بر اساس آئین نامه اصلاح شده بستر و حریم رودخانه ها، حریم کمی رودخانه که بلافاصله پس از بستر قرار می گیرد از 1 تا20 متر از منتهی الیه طرفین بستر رودخانه تعیین، که مقدار دقیق آن در هر بازه از رودخانه مشخص نیست. در کشورهای دیگر روشهای متفاوتی من جمله: درصد ریسک...
15 صفحه اولModelling For Ensuring Information Security Of The Distributed Information Systems
In the paper the concept of the permitted interactions is defined, i.e. such interactions are necessary for the tasks which are legally started at present. Any other interactions are considered as forbidden. The main objective is definition, what interactions are permitted during this period of time. For the solution of this problem it is offered to model the needs for interactions depending on...
متن کاملThe Conceptual Framework of Individual and Social Security Provision in Residential Complexes Based on Iranian-Islamic Foundations
Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...
متن کاملHouse of Security: Locale Roles and Resources for Ensuring Information Security
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians’ view to include information consumers’ and managers’ views), and resource (beyond technical dimensions to include managerial dimensions). Based on our definition, we develop a...
متن کاملFoundations for the Harmonization of Information Technology Security Standards
This paper is the first work product of Joint Task 1 (JT01) defined in the Joint Workplan for cooperation on Security of Information Systems [1]. The objectives of JT01 are to: (a) Establish a common set of security functionality classes, representative of international and regional market-driven needs. (b) Develop a common approach to the creation of profiles from these security functionality ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Visnyk of the Lviv University
سال: 2021
ISSN: 2307-1664
DOI: 10.30970/pps.2021.34.24