Showing 1 - 10 of 48
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning...
Persistent link: https://www.econbiz.de/10012043359
existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks … a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and … vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and …
Persistent link: https://www.econbiz.de/10012043872
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding...
Persistent link: https://www.econbiz.de/10012043884
Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning,...
Persistent link: https://www.econbiz.de/10012044683
scale of ubiquitous devices, effective and secure communication and addressing mechanism is vulnerable to several threats … analysis of various threats along with behavioral modeling of attack. Further, this article presents comprehensive literature …
Persistent link: https://www.econbiz.de/10012045660
. Finally, female students were more negligent when it comes to setting the devices to militate against security threats. …
Persistent link: https://www.econbiz.de/10012045741
This article presents six ways to use work system concepts for describing, analyzing, or evaluating IS security at the system rather than enterprise level. As a whole, this theory-based view delves into topics that typical technology or process-focused cybersecurity approaches may overlook. This...
Persistent link: https://www.econbiz.de/10012048015
-based risk analysis system (ARAS) which gathers identified threats events, probe them and correlates those using ontologies. It … threats based on an existing designed security ontology. To validate the feasibility of the approach a case study on e …
Persistent link: https://www.econbiz.de/10012048074
While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This article discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality,...
Persistent link: https://www.econbiz.de/10012048809
In this master graduation work an author has sifted the threats and perspectives of the personal investments in to the … Lithuania. The main goal of this master graduation work is to identify possible threats and determine the directions of the … financial market and real estate of Lithuania in 2007–2009, to determine the threats and the perspectives of the private …
Persistent link: https://www.econbiz.de/10009478504