Information Warfare, Threats and Information Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

11th Australian Information Warfare and Security Conference

This paper discusses the impact of agile methodology in complex and modular interrelated projects based on the authors‟ practical experience and observations. With the advancement of Web technologies and complex computer systems, business applications are able to transcend boundaries in order to fully meet business requirements and comply with the legislation, policies and procedures. The succe...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Controlling insider threats with information security policies

Over the past decade, several studies, industry reports and surveys have revealed that insider threats constitute a significant role in information security. Following the literature, we categorized insider threats as intentional and unintentional. Computer misuse and fraud are considered as the two most common intentional threats, whereas, user errors and negligence are considered as the two m...

متن کامل

Classification of Security Threats in Information Systems

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: MGIMO Review of International Relations

سال: 2014

ISSN: 2541-9099,2071-8160

DOI: 10.24833/2071-8160-2014-6-39-82-87