نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
The article presents the conceptual features of energy security management under a radically changed context, increasing crisis phenomena, and threats various natures. authors substantiate claim that is complex category, which expresses ability fuel region to supply required amount range resources domestic market at stable reasonable prices; promptly mitigate unexpected fluctuations in demand f...
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly engaging sophisticated advances like digital agents and web services. As a result of such advances, the information systems architectures that must be secured are becoming dynamic: shifting landscapes of changing vulne...
In this paper a design and implementation of a network security model was presented, using routers and firewall. Also this paper was conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and the method to prevent the attacks and hackers to access the network. Also this paper provides a checklist to use in evaluating wheth...
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...
The integration of existing and emerging technologies in Next Generation Mobile Networks (NGMN) exposes the interworked infrastructure to malicious security threats arising from individual networks and heightens the possibility of their migration across network boundaries. Owing to their autonomous characteristics, the proprietary security solutions of legacy networks cannot be extended to addr...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS securi...
Non-traditional security, often abbreviated as NTS, is a popular but rather ambiguous concept within and outside academic circles. The NTS threats and challenges are always referred to in the context of human security to focus on the security of individuals, societies and groups, which includes criminality, environmental degradation – energy, natural disasters, infectious disease and illegal mi...
As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید