نتایج جستجو برای: it security

تعداد نتایج: 2952360  

2008
Pooya Jaferian David Botta Kirstie Hawkey Konstantin Beznosov

One of the most important factors that impact usability of security systems within an organization are security tools. In this paper, we report preliminary results of our survey about design guidelines for IT security management tools. We gathered guidelines and recommendations related to IT security management tool from available literature as well as result of our previous studies on IT secur...

2001
Robert A. Gehring

Short abstract This paper in short1 presents the thesis that insecurity of software is due to interaction of technological and legal shortcomings, fostered by economic rationality. Ineffective liability laws further the distribution of unreliable and insecure software. Copyright protection for software hinders the quality improvement. Patent protection encourages the use of proprietary instead ...

2008
Rosslin John Robles Na-Yun Kim Tai-hoon Kim

Information Security is very important in e-Business. Previous IT governance frameworks have not given the connection between IT governance and e-business security sufficient attention. This paper identifies various levels of governance followed by a focus in the roles of information technology (IT) governance with reference to information security for today’ s electronic business (e-business) ...

2012
Hinrich Voelcker

Die Sicherheit der IT-Systeme ist nicht zuletzt durch das breite Interesse der Medien und Öffentlichkeit zu einem ausgesprochen wichtigen Thema jedes Wirtschaftunternehmens geworden. Vertraulichkeit, Verfügbarkeit und Integrität der Unternehmensund Kundendaten ist überlebenswichtig gerade in Bezug auf die Reputation. Besonders Banken leben von der Vertrauenswürdigkeit gegenüber ihren Kunden. Wä...

2011
Kangbin Yim Ilsun You

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. Through the overview, technological foundations in the projects are extracted and discussed. Additionally, this paper introduces a common fram...

2005
Martin Naedele Dacfey Dzung

topic of IT security is becoming increasingly relevant in modern automated industrial plants. Modern automation systems provide high levels of inter-connectivity. Implementations are based on commercial IT platforms , many of which are known to be vulnerable to electronic attacks. This article is part 1 of a three part tutorial on IT security for industrial systems. Security objectives are expl...

Journal: :Journal of Information, Law and Technology 2003
Robert A. Gehring

1998
Stefan Lindskog Ulf Lindqvist Erland Jonsson

This paper presents experience from laboratory projects performed by students in Applied Computer Security, a course given at Chalmers University of Technology. From this, we conclude that the combination of security research and education results in a synergy that can be very beneficial to both fields. The paper describes in detail three different types of laboratory projects: intrusion experi...

2002
Dimitris Gritzalis Maria Karyda Lazaros Gymnopoulos

Information Systems security evaluation is a sine qua non requirement for effective IT security management, as well as for establishing trust among different but cooperating business partners. This paper initially provides a critical review of traditionally applied evaluation and certification schemes. Based upon this review, the paper stresses the need for an approach that is quantitative in n...

2010
Hassan El Desouki Helen Armstrong

The need for the inclusion of security and quality requirements early in the life of IT projects has been recognised for more than three decades. But have we learned from past experience? This paper presents four recent case studies of IT projects that have gone wrong for a variety of security and quality reasons. The problem is not a simple one to solve, however, valuable lessons can be learne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید