نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
The purpose of this research was to analyze the perceptions of faculty members and instructors about the strengths, weaknesses, opportunities and threats posed by the implementation of the lesson study program at Farhangian University. A mixed research method was used, including both qualitative and quantitative for data collection. The statistical population of the qualitative section was c...
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...
This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threats to infrastructure services, threats to individual nodes, and threats conce...
our country, iran, is in the category of waterless and survived countries because of lack of climate downfalls to its unsuitable local to temporal transmittance. environmental concerns mainly after 1960s that have boon seriously proposed in universal politics, created a variety of assessments. in the late decades, environmental change such as: climate change, has caused chief challenges for the...
This paper examines the common threats to data security in open systems highlighting some of the more recent threats, and looks at some of the tools and techniques that are currently available to enhance the security of a Unix system. Since many programs are written without security issues in mind, the topic of secure programming methodologies is also discussed, with some examples of coding tec...
Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavio...
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified as a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss a...
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending voice transmissions as data packets over private or public IP networks as well as reassembled and decoded on the receiving side. Security concerns are always the major barrier that prevents many businesses from e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید