The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

نویسنده

  • A Michaela Vašková
چکیده

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic. Keywords—Crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Activating the Role of Audit Committees and Boards of Directors in Restricting Earnings Management Practices: A Perspective of Auditors in Jordan

The study objects for investigating the possibility of activating both audit committee and board of directors for restricting the practices of earnings management phenomenon. To achieve this objective, a questionnaire had been developed and self-administered for a selected sample consists of 123 auditors working in Jordan based on the simple random sampling method. The study first hypothesis is...

متن کامل

Designing a Model and Assessing the Capabilities of Audit Institutions in Promoting Social Trust

Increasing the number of audit firms and increasing the level of expectations and environmental changes make the issue of competition among audit firms more complex and reveal the levels of information for users and stakeholders more dynamic. The role of audit firms is considered to be critical to the promotion of social trust, and institutions that do not have the ability to compete in this fi...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Life Experiences of Student-Teachers from the Curriculum of Educational Sciences Field at Farhangian University

This study investigates the lived experience of new students and Farhangian University teachers from the curriculum of the educational sciences field. The research population included student-teachers of educational sciences. Fifteen student-teachers were selected as a research sample using purposive sampling and observing the principle of saturation and maximum diversity. The researcher used ...

متن کامل

On Attributes of Objects in Object-Oriented Software Analysis

One of the modern paradigms to develop a system is object oriented analysis and design. In this paradigm, there are several objects and each object plays some specific roles. There is a sequence of activities to develop an analysis model. In the first step, we work in developing an initial use case model. Then in the second step, they identify a number of concepts and build a glossary of partic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015