Showing 1 - 10 of 6,597
Persistent link: https://www.econbiz.de/10004918926
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information...
Persistent link: https://www.econbiz.de/10009459007
Countries across the globe are working towards e-government realisation. One of the issues arising with the efforts to this realisation is the assurance of secure transactions while withholding high privacy standards. Different systems require different levels of security according to the...
Persistent link: https://www.econbiz.de/10009352622
Purpose – One of the key components to fraud prevention is strong internal controls. However, the greatest threat to an organization's information security is the manipulation of employees who are too often the victims of ploys and techniques used by slick con men known as social engineers....
Persistent link: https://www.econbiz.de/10010814586
Рассмотрена сущность понятия информационной опасности, содержание информационных угроз и виды информационного оружия, определены последствия негативного...
Persistent link: https://www.econbiz.de/10011216052
The paper provides an overview of the role and feasibility of information security in supply chains. After the clarification of basic notions the authors will arrive at establishing requirements postulated for supply chain member companies based on the properties of logistics information...
Persistent link: https://www.econbiz.de/10008470092
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
Software vulnerability disclosure has become a critical area of concern for policymakers. Traditionally, a Computer Emergency Response Team (CERT) acts as an infomediary between benign identifiers (who voluntarily report vulnerability information) and software users. After verifying a reported...
Persistent link: https://www.econbiz.de/10009218396
Persistent link: https://www.econbiz.de/10003999058
Persistent link: https://www.econbiz.de/10004136270