Institute of Information Security Issues, Lomonosov MSU
نویسندگان
چکیده
منابع مشابه
Information security issues in mobile computing
During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. Effects of this new vision is currently evident in the flourishing numbers of mobile telephones and portable computing units. In this paper we investigate some issues concerning the security of mobile computing...
متن کاملInformation Security Issues In Global Supply Chain
The control of information flow and their security are of great importance to organizations participating in the global supply chain. Significant gap exists in the research literature on supply chain information security (SCIS). Based on literature review, the paper suggests a framework highlighting the issues that demands attention for securing inter-organizational information flows in the glo...
متن کاملSecurity issues for automated information systems
The growing interconnectivity of computer systems has dramatically increased the risk of exposure or corruption of information through the exploitation of system security vulnerabilities. Many aspects of organizational operations and of the national infrastructure depend upon the correct operation of computers and networks. Security is a fundamental requirement for the health of the public ente...
متن کاملInformation and Communication Technology security issues
Information and communication technologies (ICT) have noticeably shaped several aspects of our lives and contributed to major discoveries in science. While the benefits are immense, several factors are influencing negatively on ICT, therefore limiting its benefits and slowing down its proliferation. Lack of security awareness and training, operating system design and security, open source issue...
متن کاملOutsourcing Information Security: Contracting Issues and Security Implications
We examine the implications of a firm outsourcing both (i) security device management which attempts to prevent security breaches and (ii) security monitoring which attempts to detect security breaches to managed security service providers (MSSPs). In the context of security outsourcing, the firm not only faces the traditional moral hazard problem as it cannot observe an MSSP’s prevention or de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bezopasnost informacionnyh tehnology
سال: 2017
ISSN: 2074-7136,2074-7128
DOI: 10.26583/bit.2017.1.05