منابع مشابه
Handling Security Threats to the RFID System of EPC Networks
1 Abstract: The use of radio frequency identification (RFID) technologies in all kinds of wireless network-based applications is becoming truly pervasive. Indeed, applications based on mobile wireless ad hoc networks (MANETs), wireless sensor networks (WSNs), and vehicular ad hoc networks (VANETs), among others, can highly benefit from the adoption of battery-less RFID solutions, such as electr...
متن کاملThreats to TCP/IP Security
Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملThreats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the messages exchanged between the vehicles and between the vehicles and specialized infrastructure be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC W...
متن کاملSecurity Ontology: Simulating Threats to Corporate Assets
Threat analysis and mitigation, both essential for corporate security, are time consuming, complex and demand expert knowledge. We present an approach for simulating threats to corporate assets, taking the entire infrastructure into account. Using this approach effective countermeasures and their costs can be calculated quickly without expert knowledge and a subsequent security decisions will b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annales Universitatis Mariae Curie-Skłodowska, sectio H, Oeconomia
سال: 2016
ISSN: 0459-9586
DOI: 10.17951/h.2016.50.3.49