Security Threats: Protecting the New Cyberfrontier
نویسنده
چکیده
منابع مشابه
Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security t...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملAdaptive Risk Management System (arms) for Critical Infrastructure Protection
The purpose of this work is to develop an adaptive risk management framework capable to prevent, identify and respond in critical time to threats. Our focus is on protecting critical infrastructure (e.g. public utilities) which vitally depends on network and information security. As solution we propose a holonic Cybersecurity system that unfolds into an emergency response management infrastruct...
متن کاملنسبت دگرگونیهای منطقه غرب آسیا با امنیت ملی جمهوری اسلامی ایران
Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...
متن کاملSIP Intrusion Detection and Response Architecture for Protecting SIP-based Services
After 3GPP had selected SIP as the signaling protocol for IMS, it is expected that SIP plays an important role in IP multimedia services. But, since SIP-based services are offered over the internet, there are security threats inherited from the internet environment. There are also new security threats because new techniques have been introduced to deliver multimedia traffic over the internet. I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 49 شماره
صفحات -
تاریخ انتشار 2016