DATA LEAKAGE IN ICT OUTSOURCING: RISKS AND COUNTERMEASURES

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Industrial Espionage from Residual Data: Risks and Countermeasures

This paper outlines the possible recovery of potentially sensitive corporate information from residual data. It outlines previous work on the recovery of information contained on second hand hard disks and handheld devices and discusses the risk of individuals conducting industrial espionage by targeting specific organizations. It examines the possible avenues for an attacker to obtain a storag...

متن کامل

Selecting Countermeasures for ICT systems

A countermeasure is any change to a system to reduce the probability it is successfully attacked. We propose a model based approach that selects countermeasures through multiple simulations of the behaviors of an ICT system and of intelligent attackers that implement sequences of attacks. The simulations return information on the attacker sequences and the goals they reach we use to compute the...

متن کامل

Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts

Information systems outsourcing is now almost standard practice for many companies. Outsourcing the information processing activities is a complex issue that entails considerable implications for the strategy of the firm. An important mechanism for managing the performance of outsourcing vendors is incentive contracts. But to develop an outsourcing contract the IS manager must quantify risks an...

متن کامل

Searchable Encrypted Relational Databases: Risks and Countermeasures

We point out the risks of protecting relational databases via Searchable Symmetric Encryption (SSE) schemes by proposing an inference attack exploiting the structural properties of relational databases. We show that record-injection attacks mounted on relational databases have worse consequences than their file-injection counterparts on unstructured databases. Moreover, we discuss some techniqu...

متن کامل

Knowledge Sharing in ICT-Outsourcing Relationships

This paper discusses knowledge sharing in ICT outsourcing relationships. The ICT outsourcing literature focuses primarily on large organizations’ and with an underlying assumption that ICT outsourcing takes place when a large organization outsources an internal IT-department, IT-system or IT-function. In recent years there has been a change in this, and today ICT outsourcing has a broader meani...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information and Communication Technology

سال: 2010

ISSN: 1675-414X,2180-3862

DOI: 10.32890/jict.9.2010.8101