Preventing information security incidents

نویسندگان

چکیده

Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of importance information modern world, encroachments on resources began grow. A group security tools was developed prevent unauthorized access it or its elements. This defined as term "information security". It should be noted that precisely preventive measures ensure are important, not elimination consequences these problems. course his work, developer may accidentally make mistake consequence which future vulnerability formed at this point. Vulnerability weak point program software; having discovered point, an attacker can easily harm information. If threat came out deliberate, then there methods article discusses protection measures.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating Damages Caused by Information Systems Security Incidents

As organizations adopt increasingly sophisticated information systems, the challenge of protecting those systems becomes enormous. Accordingly, the single critical decision security managers have to make is the amount an organization is willing to spend on security measures to protect assets of the organization. To arrive at this decision, security mangers need to know explicitly about the asse...

متن کامل

Impact of information security incidents - - theory and reality

Information security (understood mainly as confidentiality, availability and integrity) plays more and more important role in every day usage of IT. The aim of this article is describe these characteristics from their theoretical as well as practical part and illustrate, what can happen in case any of them is affected. However, as IT environments still grow and are getting more and more complex...

متن کامل

Documenting Cyber Security Incidents

Organizations often record cyber security incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk. While security incident databases are often neglected, they contain invaluable information that can be leveraged to assess the threats, vulnerabilities, and impacts of cyber attacks, providing a detailed view of cyber risk in an organization....

متن کامل

Taxonomy for Computer Security Incidents

The adaptation and extension is necessary to apply the CERT-taxonomy to malware in order to categorise the threat (e.g., Trojan horses, Viruses etc.) as a basis for countermeasures. For the adaptation of the taxonomy to include malware a new entry in the tools section is needed (malicious software). This entry will cover the Trojan horses mentioned earlier. The proposed extension of the CERT-ta...

متن کامل

General Information on Preventing Infectious Diseases

This article was presented by the author at the Vaccination Seminar of May 26, 1972, National University Medical School.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nau?nyj rezul?tat

سال: 2021

ISSN: ['2518-1092']

DOI: https://doi.org/10.18413/2518-1092-2021-6-3-0-3