Threats to Security in Nigeria

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threats to TCP/IP Security

Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...

متن کامل

Threats to Security in DSRC/WAVE

Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the messages exchanged between the vehicles and between the vehicles and specialized infrastructure be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC W...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Security Ontology: Simulating Threats to Corporate Assets

Threat analysis and mitigation, both essential for corporate security, are time consuming, complex and demand expert knowledge. We present an approach for simulating threats to corporate assets, taking the entire infrastructure into account. Using this approach effective countermeasures and their costs can be calculated quickly without expert knowledge and a subsequent security decisions will b...

متن کامل

Security threats in Prepaid Mobile

Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communicatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Review of Public Administration and Management

سال: 2013

ISSN: 2315-7844

DOI: 10.4172/2315-7844.1000122