نتایج جستجو برای: security threats

تعداد نتایج: 201039  

Journal: :Energies 2023

The article presents the conceptual features of energy security management under a radically changed context, increasing crisis phenomena, and threats various natures. authors substantiate claim that is complex category, which expresses ability fuel region to supply required amount range resources domestic market at stable reasonable prices; promptly mitigate unexpected fluctuations in demand f...

2004
Richard Baskerville

The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly engaging sophisticated advances like digital agents and web services. As a result of such advances, the information systems architectures that must be secured are becoming dynamic: shifting landscapes of changing vulne...

Journal: :Int. Arab J. e-Technol. 2009
Salah Alabady

In this paper a design and implementation of a network security model was presented, using routers and firewall. Also this paper was conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and the method to prevent the attacks and hackers to access the network. Also this paper provides a checklist to use in evaluating wheth...

2011
Peter James

The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...

2007
Fazirulhisyam Hashim M. Rubaiyat Kibria Damien Magoni Abbas Jamalipour

The integration of existing and emerging technologies in Next Generation Mobile Networks (NGMN) exposes the interworked infrastructure to malicious security threats arising from individual networks and heightens the possibility of their migration across network boundaries. Owing to their autonomous characteristics, the proprietary security solutions of legacy networks cannot be extended to addr...

2017
Pierre-Emmanuel Arduin

Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS securi...

2009
Tariq Rahim Soomro

Non-traditional security, often abbreviated as NTS, is a popular but rather ambiguous concept within and outside academic circles. The NTS threats and challenges are always referred to in the context of human security to focus on the security of individuals, societies and groups, which includes criminality, environmental degradation – energy, natural disasters, infectious disease and illegal mi...

Journal: :Int. J. Fuzzy Logic and Intelligent Systems 2011
YongNyuo Shin Woochang Shin

As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets an...

Journal: :International Journal of Computer Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید