Modeling of Risk Factors in Determining Network Security Level
نویسندگان
چکیده
منابع مشابه
proficiency level and factors fostering reticence in efl learners
according to cheng (1999), in recent esl/efl literature, asian (especially east asian) learners of english as a foreign/second language have been arguably reported as reticent and passive learners. the most common allegations are that these students are reluctant to participate in classroom discourse; they are unwilling to give responses; they do not ask questions; and they are passive and over...
15 صفحه اولanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولAnalysis of Factors Determining Households Food Security in Pastoral Area Oromia Region, Moyale District, in Ethiopia
This study examined the status and determinants of rural households’ food security in Moyale district of pastoral area, Oromia regional state, in Ethiopia. Both secondary and primary data were used for the study. The study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. Analytical tools used include descriptive statistics, Foster-Greer...
متن کاملInformation Security Assessment by Quantifying Risk Level of Network Vulnerabilities
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estima...
متن کاملModeling Security Risk Factors in a Cloud Computing Environment
With the rapid developments in information technologies and the success of Internet, computing resources have become cheaper, more powerful, and more available than before. This technological development has enabled the realization of long held dream called “computing as utility”, in which resources are provided as a general utility that can be leased and released by users through the Internet ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2014
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2014.8.3.21