نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :International Journal of Computer Applications Technology and Research 2016

Journal: :RFC 2005
Hannes Tschofenig Dirk Kröselberg

This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.

2017
Mark Rounds Richard Pendegraft Norman Pendegraft Robert Stone

University students are very knowledgeable internet users, yet there seems to be disconnect between their actions and the security of their computer systems. This paper reports the results of an on-line survey of students’ awareness of security threats on-line and their preparation to meet those threats.

2010
Edita Djambazova Magnus Almgren Kiril Dimitrov Erland Jonsson

This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serio...

2012
Leila Esmaeili Ali Arasteh

In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attent...

2017
Muhammad Taqi Raza Fatima Muhammad Anwar Songwu Lu

Despite security shields to protect user communication with both the radio access network and the core infrastructure, 4G LTE is still susceptible to a number of security threats. The vulnerabilities mainly exist due to its protocol’s inter-layer communication, and the access technologies (2G/3G) inter-radio interaction. We categorize the uncovered vulnerabilities in three dimensions, i.e., aut...

2013
Rauno Kuusisto Erkki Kurkinen Grigorios Fragkos Olga Angelopoulou Konstantinos Xynos

Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increasein the online services and operations for various industries has led to an increase in different security threats and maliciousactivities. In US, the department of homeland security reported recently that there have been 200 attacks on core criticalinfrastructures i...

Journal: :IJEBM 2014
Princely Ifinedo

This study enriches the information provided in the 2012 Deloitte Touche Tohmatsu Limited (DTTL) survey that dealt with information security threats and controls in the global financial services institutions (GFSI). It seeks to provide information on the effects of national cultural dimensions on information security threats and controls in GFSI. The study’s analysis used secondary data, which ...

Journal: :Journal of Computer Security 2011
Simon N. Foley William M. Fitzgerald

Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, whereby knowledge about the effe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید