منابع مشابه
The Laws of Physics and Cryptographic Security
This paper consists of musings that originate mainly from conversations with other physicists, as together we’ve tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our thinking at every level. I begin by discussing...
متن کاملInformation Theoretic Security by the Laws of Classical Physics - (Plenary Paper)
It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop—i.e., a Kirchhoff-Law-JohnsonNoise (KLJN) protocol—for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely...
متن کاملAn Overview of Laws and Standards for Health Information Security and Privacy
In the complex technological world that healthcare organizations and their business associates operate, there exist security threats and attacks which render individually identifiable health information vulnerable. Laws exist to ensure that healthcare providers take practical measures to address the security and privacy needs of health information. There are also standards that assist healthcar...
متن کاملToo Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?
South Africa has myriad laws that address information security related issues. One such law is the Electronic Communications and Transactions Act of 2002 (ECTA), which is highly regarded internationally. A study, which forms the basis of this paper, found that not all provisions of this legislation that deal with information security are implemented by both the government and information securi...
متن کاملInformation and Information Security
Insecurity, threats to information, need to defend information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction are nearly always deliberate. Accidents, which in 90ties were responsible for most Information Security issues a plane flows into an office building destroying all computers in it, employee mistakes ("Format C:"), fire,...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
حقوق اسلامیجلد ۵، شماره ۱۹، صفحات ۱۳۷-۱۶۳
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023