نتایج جستجو برای: information security management system

تعداد نتایج: 3724607  

2005
Shang-Juh Kao Lai-Ming Shiue

A network system could be better protected by physically dividing it into administrative management groups according to different access rights. However, to effectively manage a network system, security information sharing is necessary. Since a system could suffer from the same security threats as another system, how to share the security information to prevent a system from the same security f...

Journal: :Journal of Information Processing and Management 2006

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Journal of the Korea Society of Digital Industry and Information Management 2016

2004
Charles C. Tappert Sung-Hyuk Cha

Security informatics represents a paradigm shift in university curricula in computing. In order to meet this challenge we will require a systemic curriculum change beyond the usual local course and program changes that have successfully handled smaller technological advances and shifts in the past. One of the novel approaches we use to teach information security at Pace University is to introdu...

2013
Charles C. Tappert Sung-Hyuk Cha

Security informatics represents a paradigm shift in university curricula in computing. In order to meet this challenge we will require a systemic curriculum change beyond the usual local course and program changes that have successfully handled smaller technological advances and shifts in the past. One of the novel approaches we use to teach information security at Pace University is to introdu...

Journal: :CoRR 2018
Endang Kurniawan Imam Riadi

this research was conducted to find out the level of information security in organization to give recommendations improvements in information security management at the organization. This research uses the ISO 27002 by involving the entire clause that exists in ISO 27002 check-lists. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses of ISO...

Journal: :Proceedings of the International Conference on Business Excellence 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید