security and control instrumentalities in information systems
نویسندگان
چکیده
0
منابع مشابه
supply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولAnalysing Security in Information Systems
The last few years there is a tendency to integrate security issues during the development of information systems with the aim to develop more secure information systems. In this paper we propose an analysis, based on the measures of criticality (how critical a component of the system is) and complexity (represents the effort required by the components of the system to achieve the requirements ...
متن کاملInformation Systems Security
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opin...
متن کامل3 . Information Systems Security
The greater the military leverage that C4I systems provide for U.S. forces, the larger the incentives are for an opponent to attack those systems. Indeed, it makes little sense for an opponent to challenge the U.S. “symmetrically”, i.e., force-on-force. More likely avenues of challenge are “asymmetric”, i.e., avenues that exploit potential U.S. vulnerabilities. Attacking U.S. C4I systems – whet...
متن کاملAnalysing Information Systems Security
The paper describes problems with managing information systems security, due to its complexity and broad scope. Then, a security taxonomy is presented and discussed. The taxonomy is used in conjunction with different approaches to information security analysis, including the evaluation of different cost-benefit criteria. The paper also uses the terms proactive and reactive analysis as a way of ...
متن کاملInformation Flow-Based Security Levels Assessment for Access Control Systems
Access control systems are designed to allow or deny access to data according to organizational policies. In many organizations, the access rights of subjects to data objects are determined in consideration of clearance levels of subjects and classification levels of objects. In most formally-defined traditional access control systems, levels are predetermined and policies are rigid. However, i...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
مطالعات ملی کتابداری و سازماندهی اطلاعاتجلد ۸، شماره شماره ۱ و ۲، صفحات ۸-۲۸
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023