Showing 91 - 100 of 8,276
This paper presents the survey conducted to assess end-user engagement in building organisation's security. A total of … survey showed that old security problem such as passwords sharing still exist. The findings from this paper can be used by … security officers and implementers within organisation to build and maintain sustainable secure organisation. …
Persistent link: https://www.econbiz.de/10012045416
Management may see security as an inhibitor to the daily operations if the investment is not well aligned with current … business activities or is presented in financial terms not relevant to their agenda. While this article shows that security … improvements create bottom-line business benefits, there is still a need for security managers to focus on quantifying those …
Persistent link: https://www.econbiz.de/10012045439
resilience. The authors propose a set of metrics for assessing the security and privacy of information sharing tools for … security and privacy for different important categories of users of such systems, to better understand how these aspects affect … the willingness to share information. Security and privacy is of particular importance for whistle-blowers that may carry …
Persistent link: https://www.econbiz.de/10012045610
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the...
Persistent link: https://www.econbiz.de/10012045658
In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The … proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide … proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security …
Persistent link: https://www.econbiz.de/10012045681
Data and document privacy concerns are increasingly important in the online world. In Cloud Computing, the story is the same, as the secure processing of personal data represents a huge challenge The main focus is to to preserve and protect personally identifiable information (PII) of...
Persistent link: https://www.econbiz.de/10012045682
isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the … is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for … solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and …
Persistent link: https://www.econbiz.de/10012045692
security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles …
Persistent link: https://www.econbiz.de/10012045695
Honeypots are the network sensors used for capturing the network attacks. As these sensors are solely deployed for the purpose of being attacked and compromised hence they have to be closely monitored and controlled. In the work presented in this paper the authors have addressed the problem of...
Persistent link: https://www.econbiz.de/10012045699
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices …
Persistent link: https://www.econbiz.de/10012045707