نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :JCM 2006
Zhaoyu Liu Dichao Peng

RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy violations. Many protocols have been proposed to address privacy and security issues in RFID systems. Physical attacks receive few considerations from the current research. Through physically attacks, attackers can ge...

Journal: :CoRR 2014
Alexander Ngenzi

As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before they enter into the systems and there is no way how this can be prevented without knowing where they come from. The issue of resource allocation and revenue maximization is also equally importa...

2012
Janine L. Spears

During a lawsuit, an organization is required to discover and produce relevant electronic data. In many cases, relevant data includes confidential data, such as personal information or trade secrets. During the course of a lawsuit, the discovered data may exchange many hands. This study analyzes data security threats and corresponding countermeasures within the eDiscovery process by constructin...

1997
Phil Williams

To understand the causes of turbulence and disorder in the post– Cold War world it is necessary to examine sub-national and transnational forces as well as inter-state relations. The danger is that the consideration of new security challenges will encourage the fabrication of enemies or security threats. This, however, should not inhibit efforts to reassess the challenges to national and intern...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2006
Karim Keshavjee Nick Pairaudeau Alisha Bhanji

Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated se...

2016
Marko Novak Syed Noorulhassan Shirazi Aleksandar Hudic Thomas Hecht Markus Tauber David Hutchison Silia Maksuti Ani Bicaku

An analysis of new technologies can yield insight into the way these technologies will be used. Inevitably, new technologies and their uses are likely to result in new security issues regarding threats, vulnerabilities and attack vectors. In this paper, we investigate and analyse technological and security trends and their potential to become future threats by systematically examining industry ...

2013
Run Chen Jiliu Zhou Caiming Liu

The Internet of Things (IoT) confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger. However, the research achievements of the danger assessment technology for IoT are rare. To calculate the danger value of IoT with many dispersive sense nodes, the theoretical model of distributed danger assessment for IoT is explored in this paper. The principles and...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2006
Roger Stern

It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assump...

2005
Fariborz Farahmand Shamkant B. Navathe Gunter P. Sharp Philip H. Enslow

Information security executives have always been faced with the problem of justifying security technology investments because the technology benefits are difficult to estimate. There are tangible and intangible benefits that accrue from implementation of security measures; similarly the losses due to security incidents fall into both of these categories. This further complicates estimation. Cur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید