security of information laws

نویسندگان

سیدوحید ابوالمعالی الحسینی

دانشجوی دکتری حقوق جزا و جرم شناسی دانشگاه تهران زهراسادات علیزاده طباطبایی

دانشجوی دکتری حقوق جزا و جرم شناسی دانشگاه تهران

چکیده

0

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Laws of Physics and Cryptographic Security

This paper consists of musings that originate mainly from conversations with other physicists, as together we’ve tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our thinking at every level. I begin by discussing...

متن کامل

Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper)

It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop—i.e., a Kirchhoff-Law-JohnsonNoise (KLJN) protocol—for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely...

متن کامل

An Overview of Laws and Standards for Health Information Security and Privacy

In the complex technological world that healthcare organizations and their business associates operate, there exist security threats and attacks which render individually identifiable health information vulnerable. Laws exist to ensure that healthcare providers take practical measures to address the security and privacy needs of health information. There are also standards that assist healthcar...

متن کامل

Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?

South Africa has myriad laws that address information security related issues. One such law is the Electronic Communications and Transactions Act of 2002 (ECTA), which is highly regarded internationally. A study, which forms the basis of this paper, found that not all provisions of this legislation that deal with information security are implemented by both the government and information securi...

متن کامل

Information and Information Security

Insecurity, threats to information, need to defend information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction are nearly always deliberate. Accidents, which in 90ties were responsible for most Information Security issues a plane flows into an office building destroying all computers in it, employee mistakes ("Format C:"), fire,...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
حقوق اسلامی

جلد ۵، شماره ۱۹، صفحات ۱۳۷-۱۶۳

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023