نتایج جستجو برای: information security management system
تعداد نتایج: 3724607 فیلتر نتایج به سال:
As part of the research project"Secure information networks of small- and medium-sized energy providers"(SIDATE), a survey about the IT security status of German energy providers was conducted. The project itself is focused on the IT security of small- and medium-sized energy providers. In August 2016, 881 companies listed by the Federal Network Agency were approached. Between, September 1 st 2...
Information System Security and its management ”is a parasite on the profit”. Gerald Kovacich. This thesis presents research intended to modify the understanding of information system security and to introduce information system security not only as a cost factor but also as a business enabler for eCommerce systems. To achieve this, system theoretic concepts will be applied to information secur...
Objective: with the development of information technology, computer information system has become the lifeblood of the national institutions and the pillar of the social activities, so the information security is particularly important. Methods: in this paper, according to the level and structure of information security model, it is proposed based on the host, network, facilities, and methods s...
The rapid development and wide application of computer network effectively promoted the development of China’s economy and information technology, but network and information security problems also came. In our view, we should focus on management on one hand and grasp network security technique on the other hand. Both are equally important. Without the support of management, even the best techn...
A brief description of the terms "information support" and security" subjects economic activity is given. The necessity ensuring protection information support in system security organizations substantiated. classification attacks risks their occurrence has been carried out. strategies for environment presented.
Security Architecture (SA) is concerned with such tasks as design, development and management of secure business information systems. These tasks are inherently complex and become several orders of magnitude more sophisticated in a Collaborative De-Perimeterised Environment (CDePE). Although significant research exists about the technical solutions that may be used in a CDePE, we believe there ...
Today’s modern society is extremely dependent on computer based information systems. Many of the organizations would simply not be able to function properly without services provided by these systems, just like financing organizations. Althou gh interruption might decrease the efficiency of an organization, theft or unintentional disclosure of entrusted private data could have more serious cons...
Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation and management of information security knowledge. While information security ontologies already exist, no methods...
Users who downloaded this article also downloaded: Lam#for Kwok, Dennis Longley, (1999),"Information security management and modelling", Information Management & Computer Security, Vol. 7 Iss 1 pp. 30-40 Kevin J. Fitzgerald, (1995),"Information security baselines", Information Management & Computer Security, Vol. 3 Iss 2 pp. 8-12 Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید