نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.
University students are very knowledgeable internet users, yet there seems to be disconnect between their actions and the security of their computer systems. This paper reports the results of an on-line survey of students’ awareness of security threats on-line and their preparation to meet those threats.
This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serio...
In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attent...
Despite security shields to protect user communication with both the radio access network and the core infrastructure, 4G LTE is still susceptible to a number of security threats. The vulnerabilities mainly exist due to its protocol’s inter-layer communication, and the access technologies (2G/3G) inter-radio interaction. We categorize the uncovered vulnerabilities in three dimensions, i.e., aut...
Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increasein the online services and operations for various industries has led to an increase in different security threats and maliciousactivities. In US, the department of homeland security reported recently that there have been 200 attacks on core criticalinfrastructures i...
This study enriches the information provided in the 2012 Deloitte Touche Tohmatsu Limited (DTTL) survey that dealt with information security threats and controls in the global financial services institutions (GFSI). It seeks to provide information on the effects of national cultural dimensions on information security threats and controls in GFSI. The study’s analysis used secondary data, which ...
Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, whereby knowledge about the effe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید