نتایج جستجو برای: security management

تعداد نتایج: 1006782  

2011
Larissa Fast Faith Freeman Michael O’Neill Elizabeth Rowley

2011
Theodoros Ntouskas Dimitrios Papanikas Nineta Polemi

Although small, medium and micro enterprises (SMEs, mEs) play a decisive role in the European digital economy, they have been identified as one of the weakest links in information security. Identifying these security weaknesses and needs we parameterize our open collaborative environment STORM in order to offer a cost-efficient tool to the SMEs and mEs for self-managing their security.

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

1998
Rainer Falk Markus Trommer

The security of a network depends heavily on the ability to manage the available security mechanisms eeectively and eeciently. Concepts are needed to organize the security management of large networks. Crucial is the possibility to cope with frequent changes of the conngu-ration and with the complexity of networks consisting of thousands of users and components. In the presented concept the net...

2017
Antonella Chirichiello Claudio Porretti Antonio Berardi

This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.

Journal: :Inf. Manag. Comput. Security 2014
Evandro Alencar Rigon Carla Merkle Westphall Daniel Ricardo dos Santos Carlos Becker Westphall

! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...

Journal: :Inf. Sci. 2013
Yu-Ping Ou Yang How-Ming Shieh Gwo-Hshiung Tzeng

As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and try to eliminate the risk of information being compromised or reduce this risk to an acceptable level. This paper proposes an information security ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید