نتایج جستجو برای: security evaluation
تعداد نتایج: 991221 فیلتر نتایج به سال:
In a time where more business is conducted over the Internet, the security of such systems, for instance electronic money transfer, becomes critical. A firewall serves as a frontline of the security measures that can be taken by an organisation in order to secure the integrity of a private network. This report describes methods of evaluating the security of a firewall. The existing methods on t...
This thesis presents the findings of an empirical study into the evaluation, formation and implementation of information security management systems aiming to protect organisational information assets. An action research oriented strategy and a research method informed mainly by grounded theory, are employed. The main elements of this thesis are 1) a blueprint process for information security m...
In this paper the authors propose security requirements elicitation method by scenario weaving. When the stakeholders write the behaviors of a system in scenarios or use cases, they may not have concern on software security. We prepare scenario fragments based on security evaluation criteria and weave them into the scenarios. Then we elicit the advices of weaving. The advices express the condit...
The body of research that focuses on employees’ Information Security Policy compliance is problematic as it treats compliance as a single behavior. This study explored the underlying behavioral context of information security in the workplace, exploring how individual and organizational factors influence the interplay of the motivations and barriers of security behaviors. Investigating factors ...
Accreditors want to know what vulnerabilities will exist if they decide to turn on a system. TCSEC evaluations address products, not systems. Not only the hardware and software of a system are of concern; the accreditor needs to view these components in relation to the environment in which they operate and in relation to the system’s mission and the threats to it. This paper proposes an informa...
Cloud service, a new internet business, is expected to lead the innovation of paradigm and continuously grow as a future growth engine, but various barriers are occurring that hinder the vitalization of the business such as security, cost, backup, performance and reliability related to the service adoption and usage. In the current circumstance where alleviating the market barriers in advance i...
Evaluation techniques to analyze security properties in ad hoc routing protocols generally rely on manual, non-exhaustive approaches. Non-exhaustive analysis techniques may conclude a protocol is secure, while in reality the protocol may contain an unapparent or subtle flaw. Using formalized exhaustive evaluation techniques to analyze security properties increases protocol confidence. In this p...
This paper sets out the proposition that mandatory security functionality, with its associated enforcement and evaluation criteria, are required in computer and data network systems to meet emerging national and international laws and guidelines for information systems security. The OECD 1992 Guidelines for Information Systems Security are used as a baseline for the consideration of such levels...
To achieve a certain degree of information systems security different techniques have been proposed and implemented so far. It is the aim of this paper to form a basis for their evaluation and comparison. For this purpose a general framework of security is established by defining its scope, most common threats against the security, and two kinds of different comparison and evaluation criteria. ...
1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید