نتایج جستجو برای: security threats

تعداد نتایج: 201039  

2017
John C. Pendergrass C. Ranganathan V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper presents a high level analysis of a telemedicine applicati...

Journal: :Annales Universitatis Mariae Curie-Skłodowska, sectio H, Oeconomia 2016

Journal: :پژوهشنامه ایرانی سیاست بین الملل 0
مجید محمدشریفی مریم دارابی منش

security has been the most important issue in relations between turkey and the european :union:. turkish leaders have always tried to link their own security concerns with those of the :union:, trying to portray their country as net security provider to the eu. the european :union: in its new security strategy has tried to expand its security zone outside the eu, defining issues such as terrori...

Journal: :IJHISI 2014
John C. Pendergrass Karen Heart C. Ranganathan V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threat...

Journal: :international journal of environmental research 0
e. alizadeh department of political geography, science & research branch, islamic azad university (iau) , tehran , iran z. pishgahi fard department of geography,university of tehran,tehran iran

after the cold war, the concept of international security underwent a modification. among the most important components of such a transformation, the consolidation of ‘environmental security’, a topic in international security, can be taken into account. environmental security deal with threats that are not only the unintentional result of social and economic activities but are very slow in...

2007
Joaquin Garcia-Alfaro Michel Barbeau Evangelos Kranakis

Detecting and responding to security and privacy threats on Radio Frequency IDentification (RFID) technologies are becoming one of the major concerns of information security researchers. However, and before going further in these activities, an evaluation of threats in terms of importance must be done. We present in this paper an evaluation of threats on Electronic Product Code (EPC) based RFID...

2006
Brian Floyd

Security threats abound in today’s digital age and along with this, network administrators need to adhere to industry best practices when it comes to their internet infrastructure. Security threats arise almost on a daily basis and an aware administrator needs to be able to understand the types of risks and be able to respond quickly and appropriately. This paper discusses the basics of differe...

Journal: :JCP 2015
Mouna Jouini Latifa Ben Arfa Rabai

The development of information technology leads to several kind of security threats which can cause different damages like financial losses. Security threat breaches affect specially the confidentiality, the integrity and the availability of a system. Indeed, as the environment continues to become more dynamic the process of making good security decisions is becoming more and more challenging. ...

2003
Guttorm Sindre Donald G. Firesmith Andreas L. Opdahl

The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them into a repository of generic threats and requirements. Development with reuse involves identifying security assets, setting security goals for each asset, identifying t...

Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید