نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :مطالعات راهبردی سیاستگذاری عمومی 0
نسا زاهدی استادیار مطالعات منطقه ای دانشگاه مفید سعید امینی کارشناس ارشد مطالعات خاورمیانه و شمال آفریقا

security issues are the main concerns for players in international relations, for they put them on guard against potential relations that might cause threats. security feeling or lack of it determines the modality of cooperation and alliance among regional and trans-regional countries. the european :union: is vulnerable to threats and crises arising in the neighboring middle east. this state of...

2010
Hui Wang Shulan Gao Bibo Lu Zihao Shen

Nowadays, mostly security solutions are mainly focused on how to defend against various threats, including insider threats and outsider threats, instead of trying to solve security issues from their sources. In this paper, a security requirements engineering process is presented for security requirements elicitation and analysis. And the proposed process will deal with the security requirements...

2011
Ali Alper Yayla

Over the past decade, several studies, industry reports and surveys have revealed that insider threats constitute a significant role in information security. Following the literature, we categorized insider threats as intentional and unintentional. Computer misuse and fraud are considered as the two most common intentional threats, whereas, user errors and negligence are considered as the two m...

Journal: :Indian Journal of Science and Technology 2016

Journal: :J. Org. Computing and E. Commerce 2008
Jackie Rees Ulmer Jonathan P. Allen

Conduct Security Assessment •Information Assets •Physical Assets Conduct Security Assessment •Information Assets •Physical Assets Assess Business Risk •Estimate Threats •Assign Probabilities of Loss Assess Business Risk •Estimate Threats •Assign Probabilities of Loss Develop Security Recommendations •Allocate Resources •Create Procedures Develop Security Recommendations •Allocate Resources •Cre...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

2011
Summer Olmstead Ambareen Siraj

The critical infrastructure powering the nation is currently undergoing a massive collaborative effort to integrate modern technologies with 50 year-old assets derived from 100 year-old designs. Improving the existing electric power infrastructure with smart grid technologies compounds existing threats with new threats. Identification of next generation smart grid security threats is vital for ...

2013
S. Sugantha C. Ramasamy S. Abu-Nimeh D. Nappa X. Wang Z. M. Mao F. Jahanian Natthakan Iam-On Tossapon Boongoen Simon Garrett Rui Xu

In recent years, an increasing number of security threats have brought serious risks to the internet. Internet security is needed for providing protection from internet related threats whose are threatening the availability of the internet, and the privacy of its users. One best solution for providing internet security is to use antivirus software product and it uses signature based detection m...

2006
Ram L. Kumar Sungjune Park Chandrasekar Subramaniam Tae Sung

Organizations are faced with different types of information security threats and implement several security technologies to mitigate these security threats. The security technologies vary in their ability to deal with different types of security threats and hence, organizations usually implement a portfolio of security technologies. A key challenge for organizations is to evaluate and determine...

ژورنال: مجله طب نظامی 2020

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید