نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :Information & Security: An International Journal 2013

2017
Jungwoo Ryoo Soyoung Kim Junsung Cho Hyoungshick Kim Simon Tjoa Christopher V. DeRobertis

Internet of Everything (IoE) is a newly emerging trend especially in homes. Marketing forces towards smart homes are also accelerating the spread of IoE devices in households. An obvious danger of rapid adoption of these gadgets is that many of them lack controls for protecting the privacy and security of end users from attacks designed to disrupt lives and incur financial losses. Our research ...

2014
D. Fischer B. Markscheffel T. Seyffarth

The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...

2005
Patricia A. H. Williams

Issues in the security of medical data present a greater challenge than in other data security environments. The complexity of the threats and ethics involved, coupled with the poor management of these threats makes the protection of data in clinical practice problematic. This paper discusses the security threats to medical data in terms of confidentiality, privacy, integrity, misuse and availa...

2012
Hiteshi Thapar

Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...

2003

Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...

2016
J. Matthews J. Herne T. Deshane P. Jablonski L. Cherian M. McCabe R. Perez L. van Doorn

Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...

Journal: :CoRR 2015
Kamal Ahmat

Cloud computing is one of the latest emerging innovations of the modern internet and technological landscape. With everyone from the White house to major online technological leaders like Amazon and Google using or offering cloud computing services it is truly presents itself as an exciting and innovative method to store and use data on the internet. In this paper, we discuss some of the most k...

2009
Chia Yao Lee

The influx of Fortune 500 companies like IBM, Toyota and Starwood Hotels into the virtual world of Second Life has generated much publicity in 2006 and 2007. The virtual world landscape has changed substantially since. Many early adopters have abandoned virtual worlds, and the number of security-related incidents in virtual worlds has risen substantially. This paper discusses key security threa...

2013
Tapalina Bhattasali Rituparna Chaki Nabendu Chaki

Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید