The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure
نویسنده
چکیده
The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic. Keywords—Crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event.
منابع مشابه
Activating the Role of Audit Committees and Boards of Directors in Restricting Earnings Management Practices: A Perspective of Auditors in Jordan
The study objects for investigating the possibility of activating both audit committee and board of directors for restricting the practices of earnings management phenomenon. To achieve this objective, a questionnaire had been developed and self-administered for a selected sample consists of 123 auditors working in Jordan based on the simple random sampling method. The study first hypothesis is...
متن کاملDesigning a Model and Assessing the Capabilities of Audit Institutions in Promoting Social Trust
Increasing the number of audit firms and increasing the level of expectations and environmental changes make the issue of competition among audit firms more complex and reveal the levels of information for users and stakeholders more dynamic. The role of audit firms is considered to be critical to the promotion of social trust, and institutions that do not have the ability to compete in this fi...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملLife Experiences of Student-Teachers from the Curriculum of Educational Sciences Field at Farhangian University
This study investigates the lived experience of new students and Farhangian University teachers from the curriculum of the educational sciences field. The research population included student-teachers of educational sciences. Fifteen student-teachers were selected as a research sample using purposive sampling and observing the principle of saturation and maximum diversity. The researcher used ...
متن کاملOn Attributes of Objects in Object-Oriented Software Analysis
One of the modern paradigms to develop a system is object oriented analysis and design. In this paradigm, there are several objects and each object plays some specific roles. There is a sequence of activities to develop an analysis model. In the first step, we work in developing an initial use case model. Then in the second step, they identify a number of concepts and build a glossary of partic...
متن کامل