نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and ...
This paper presents an adaptive policy management scheme for the security threats in distributed systems. First, we investigate the security aspects of computer networks architecture and observe that security services are provided at application, transport and network layers. Network layer security presents some important opportunities for offering controls over security threats to distributed ...
Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communicatio...
Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. This paper discusses the vari...
Nuclear facilities have not been designed to withstand a deliberate crash by a jumbo jet full of fuel or many other types of attack. A successful attack could have widespread and catastrophic consequences for both the environment and public health. The extent of damage caused will depend on the type of nuclear facility, the nature of the attack, weather conditions and the success of mitigation ...
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, b...
Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work...
Advanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various ...
The proliferation of smart-phone devices, with ever advancing technological features, has brought the issue of mobile device security back into focus. Mobile devices are rapidly becoming attractive targets for malicious attacks due to significant advances in both hardware and operating systems. The modern mobile platforms, like Android, iOS and Symbian, increasingly resemble traditional operati...
Over the past decades, mobile security threats have continued to change according to the mobile environment, which includes technical support such as mobile device specifications and network infrastructure. The current focus on security threats has not been on program defects in mobile devices but on errors made by human users (i.e., human or user errors). To prevent the damage from emerging th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید