Education Organization Baseline Control Protection and Trusted Level Security
نویسندگان
چکیده
منابع مشابه
Active Protection of Trusted Security Services
Secure electronic communication relies on the application of cryptography. Recently, there has been an explosion in the growth of Public Key Infrastructure technology, where centralized or partially centralized services provide addresses and keys for participants desiring to establish secure channels with one another. We consider the traffic to and from these servers to be the foundation of the...
متن کاملInformation Security Awareness: Baseline Education and Certification
People have become an important factor in securing the information technology environment. They need to be made aware of its importance, as well as what their role is in securing information assets. Despite the widespread acceptance of this fact many organisations still lack an information security awareness program to instil this knowledge. This paper will explore the possibility of improving ...
متن کاملCyber Security and Trusted Computing
An increasing number of military systems are being developed using Service Oriented Architecture (SOA). Some of the features that make SOA appealing, like loose coupling, dynamism and composition-oriented system construction, make securing service-based systems more complicated. We have been developing Advanced Protected Services (APS) technologies for improving the resilience and survival of S...
متن کاملTrusted Computing: Security and Applications
The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technology, now present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality, has the potential to have a major practical impact, but has not been widely discussed. This paper is an attempt to encourage greate...
متن کاملA trusted measurement model based on dynamic policy and privacy protection in IaaS security domain
In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user’s private property. However, in the case of privacy protection, how to ensure the security of files in the user virtual machine and the user virtual machine’s behavior does not affect other virtual machines; it is a major challenge. This paper presents a trusted measurement model based on dynamic policy and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Forensics, Security and Law
سال: 2007
ISSN: 1558-7223
DOI: 10.15394/jdfsl.2007.1030