منابع مشابه
Information Assurance
1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...
متن کاملInformation Assurance
As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying th...
متن کاملComplexity-Based Information Assurance
Unless vulnerabilities can be identified and measured, the information assurance of a system can never be properly designed or guaranteed. Results from a study on complexity evolving within an information system using Mathematica, Swarm, and a new Java complexity probe toolkit are presented in this paper. An underlying definition of information security is hypothesized based upon the attacker a...
متن کاملTraining for Information Assurance
O ne of the newest threats to our national security comes not from a novel weapon or an unfamiliar adversary, but through the intangible bits and bytes of cyberspace. Information technology has become a two-sided coin: With the opportunity for tremendous advances comes the potential for crippling loss. 1 Thus, IT-literate societies , among which the US ranks highest, are at great risk. Although...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2000
ISSN: 0861-5160
DOI: 10.11610/isij.0511