نتایج جستجو برای: it security

تعداد نتایج: 2952360  

Journal: :The Journal of the Institute of Image Information and Television Engineers 2002

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

2005
Per Røe Jon Ølnes André Larsen Ilangko Balasingham Karl Øyri

This document describes given an analysis of the computer security aspects of the demonstrator developed in work package 12 of the Wireless Health and Care (WsHC) project. A risk analysis is performed and requirements for the system are established. The implementation of security measurements implemented in the demonstrator is discussed. Finally the risk analysis is revised according to the pro...

2010
Konstantinos Drakakis Daniel Zelterman

The game of lottery is both popular and simple. Focusing on the essentials, and leaving aside additional features of secondary importance, which vary across different lottery implementations, the rules of the game are as follows: each player submits to the lottery organizers a ticket consisting of M integers selected by the player, without repetitions, selection order being unimportant from the...

2011
Hamid Tohidi

In this century, information, along with other factors of production, is a valuable and vital component of the organizations. With increasing technology advances, organizations have realized the undeniable benefits of Information Technology (IT) to increase the quality, accuracy and speed of affairs and most managers have become aware of the importance of its use in increasing efficiency and ef...

2010
Stefan Fenz

Although a variety of information security risk management (ISRM) approaches have been proposed, well-founded methods that provide an answer to the following question are still missing: How can the risk level of a business process be determined by taking the risk levels of the involved resources into account? This paper presents our research results regarding resource-based risk analysis method...

2016
Jens Braband

Recently, a novel approach towards semi-quantitative IT security risk assessment has been proposed in the draft IEC 62443-3-2. This approach is analyzed from several different angles, e.g. embedding into the overall standard series, semantic and methodological aspects. As a result, several systematic flaws in the approach are exposed. As a way forward, an alternative approach is proposed which ...

2010
Amit Sangroya Saurabh Kumar Jaideep Dhok Vasudeva Varma

There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. This paper primarily aims to highlight the major security issues existing in current cloud computing environments. We carry out a survey to investigate the se...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :CoRR 2016
Brian Cusack Reza Khaleghparast

Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ownership and vulnerabilities for the identification of rightful property owners when cloud services are used. It is common for image owners to embed watermarks and other sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید