- 01 - 0236 The Many Faces of Security

نویسنده

  • Laci Jalics
چکیده

There are many analogies between physical security and information security. Both are concerned with protecting something of value, and both have many aspects that need to be considered to ensure the development of cost effective security practices. Repositories for items of value become targets for theft, and the transport of items of value increases the risk for theft. Some major differences between physical security and information security are the higher risk of malicious attacks with information networks, the exposure of wireless information during transmission, and that information can be stolen without being physically removed. This paper highlights the many faces of security and provides concrete examples from the literature of common security breaches, security problems and security solutions that are relevant to vehicle information systems, and tradeoffs. Emphasis is placed on the need for the development of security policies, the important role of economics in the business of security, and the recognition that security by its nature is evolutionary and not absolute.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Household food security status in the Northeast of Iran: A cross-sectional study

  Background: An important issue the world faces today is ensuring that households living in different countries have access to enough food to maintain a healthy life. Food insecurity is prevalent in both developed and developing countries. The objective of this study was to assess the household food security status and related factors among different rural districts of Neyshabur (A city i...

متن کامل

Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition

Despite of achieving good performance in controlled environment, the conventional 3D face recognition systems still encounter problems in handling the large variations in lighting conditions, facial expression and head pose The humans use the hybrid approach to recognize faces and therefore in this proposed method the human face recognition ability is incorporated by combining global and local ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004