Filters








241,089 Hits in 5.4 sec

Investigating the work practices of network security professionals

Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Gunes Kayacik
2015 Information and Computer Security  
Purpose -The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.  ...  Findings - The empirical data collected from the survey of network security professionals strongly validate the proposed work practices model.  ...  The research leading to these results has received funding from the People Programme (Marie Curie Actions) of the European Union's 7th Framework Programme (FP7/2007(FP7/ -2013 under REA grant agreement  ... 
doi:10.1108/ics-07-2014-0049 fatcat:v4jxlrx3gzeozmisdbyawyn7hq

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Network Forensics The cyber security professional is able to investigate network security breaches using forensic methods.  ...  Software Security Prevention of Software Vulnerabilities The cyber security professional practices defensive and secure programming and uses secure programming languages to prevent the introduction of  ... 
doi:10.5281/zenodo.4765646 fatcat:ok3zjkw2ive2tlrpl3btxqr6l4

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Network Forensics The cyber security professional is able to investigate network security breaches using forensic methods.  ...  Software Security Prevention of Software Vulnerabilities The cyber security professional practices defensive and secure programming and uses secure programming languages to prevent the introduction of  ... 
doi:10.5281/zenodo.4765645 fatcat:ge7mwxfwpbfk3lifnyoc7aixzq

A Proposed Australian Industrial Control System Security Curriculum

Ernest Foo, Mark Branagan, Thomas Morris
2013 2013 46th Hawaii International Conference on System Sciences  
Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.  ...  The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations.  ...  The purpose of this paper is to propose a security curriculum for professionals working in the control system industry as well as for graduates hoping to enter the field.  ... 
doi:10.1109/hicss.2013.55 dblp:conf/hicss/FooBM13 fatcat:hingzdsfhbbfnkcb6qjyft3yxi

Forensic Resources For Network Professionals

Stephen J. Specker, Kenneth R. Janson
2010 Review of Business Information Systems (RBIS)  
This study investigates principal forensic techniques that are available to the network professional and provides an efficient access path to practical solutions to the post-breach segment of security  ...  Effective network security includes protocols to detect, to investigate, and to preclude the recurrence of any breach in the installed security systems.  ...  and, How can this type of work help law enforcement or corporate security managers?  ... 
doi:10.19030/rbis.v14i2.497 fatcat:h4j5gtjc6vfvjmibkrct2ah62u

Information Scientist and Some Similar Professionals: Their Role as a Caretaker of Security Vis-à-Vis IT Management—An Analysis

P. K. Paul, A. Bhuimali, Krishna Raj, P Sreeramana Aithal
2019 Zenodo  
Information is needed in almost all the areas and sectors, and there are many practitioners who manage the information and similar contents.  ...  Information is the most important and powerful term in today's age.  ...  The Network Administrator also need to take care of the managerial aspects of network and security management.  ... 
doi:10.5281/zenodo.3594305 fatcat:uf7yose7cbhifnt6e3vt6rbnja

Resources

Ed Zintel
2008 IT Professional Magazine  
Internet Security T he nonprofit Center for Internet Security (CIS; www.cisecurity.org) works to help organizations reduce the risk of business and e-commerce disruptions resulting from inadequate technical  ...  to advance the concepts and practices of information resource management and data resource management.  ...  ResouRces Managing Security Issues I n volume 2 of the sixth edition of Information Security Management Handbook (Auerbach Publications, 2008, ISBN 978-1-4200-6708-8, 495 pages), Harold F.  ... 
doi:10.1109/mitp.2008.77 fatcat:jcvyplgf6fhybluiy2rtqzgrqm

On the Development of a Digital Forensics Curriculum

Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin
2012 Journal of Digital Forensics, Security and Law  
In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated.  ...  There is presently no standard to guide the design of digital forensics curriculum for an academic program.  ...  Its main focus was on topics of network and security, and students are not expected to learn practical skills and tools.  ... 
doi:10.15394/jdfsl.2012.1126 fatcat:aw4qik23ebbqpgkpmnfzqsfe2a

Security Community Practices in the Western Balkans

Anastasiia Kudlenko
2020 Südosteuropa  
building and the study of professional practices.  ...  First, it offers a new perspective on security community building by linking the process to the everyday work of security personnel, foreign policy officials and even international networks.  ... 
doi:10.1515/soeu-2020-0021 fatcat:ocf5agkt7neqpbir4ypy455np4

CYBER SECURITY IN THE MODERN SOCIATION AND IMPROVEMENT OF PREPARATION OF FUTURE FACTORS IN THE FIELD OF COMPETENT APPROACH

Sergiy Voskoboiniсov, Sergiy Melnyk
2018 Social Work and Education  
such professional orientations as: "Architecture and models of security"; "Data security"; "Security of IT operations"; "Protection of operating systems"; "Computer security"; "Network security"; "Network  ...  In the United States of America and the European Union, terms such as "information security" in the sense of information security, "cyber security", "IT security", "computer and network computer and network  ... 
doi:10.25128/2520-6230.18.1.10 fatcat:3hvqn2or2jcpbdjo4yl5jerp2m

Reform of Database Course in Police Colleges Based on "Working Process"

Gao Jian
2017 International Journal of Modern Education and Computer Science  
are required in the network security supervision work in the operation skill and ability.  ...  According to the actual research results, combined with the teaching experience, this paper puts forward the reform method of the database course in police colleges.  ...  , network security supervision department of Dalian, Beijing, Kunming city to carry out a full investigation, combined with the feedback of previous graduates, according to the database management, network  ... 
doi:10.5815/ijmecs.2017.02.05 fatcat:pliedtm7mnaljjmf7wxc7r2krq

Designing a Network and Systems Computing Curriculum: The Stakeholders and the Issues

Grace Tan, Anne Therese Venables
2010 Journal of Information Technology Education Innovations in Practice  
It is innovative in its incorporation of industry-based certifications to allow students to gain relevant practical, hands-on work-related experience.  ...  The program consists of instruction in core competencies in networks and communications, supported by the teaching of skills in computer systems, programming and database systems.  ...  Advanced Networks Technologies Cisco Certified Network Associate Secu- rity (CCNA® Security) ECB2234 Network Security Cisco Certified Network Professional (CCNP®) ECB3143 Network Management  ... 
doi:10.28945/1165 fatcat:liqnnxymp5ehfoyfltq4bnf25e

Divergence of Safety and Security [chapter]

David J. Brooks, Michael Coole
2020 SpringerBriefs in Applied Sciences and Technology  
Such similarity has led to views of professional convergence; however, the professions of safety and security are distinct.  ...  This chapter explored the professional synergies and tensions between safety and security professionals, using task-related bodies of knowledge.  ...  In contrast, security has no legislation regarding professional practice except to gain a Police license to work in parts of the industry.  ... 
doi:10.1007/978-3-030-47229-0_7 fatcat:xqdo5v4skzallomj5x6s34qmqm

IFIP TC-11 [chapter]

Sushil Jajodia, William List, Graeme Mcgregor, Leon Strous
1997 Integrity and Internal Control in Information Systems  
an information system in a network environment; to advance technologies and practices that support network security controls, make possible the statement of requirements for network security, and in general  ...  the security of database systems; WG 11.4 NETWORK SECURITY Chair: prof.  ...  Datobase rent state of research and practice in Security IX will be essential reading for database security. " documents progress advanced students wor1<ing in the crea of and provides researchers and  ... 
doi:10.1007/978-0-387-35317-3_20 fatcat:6h3pqdqwcnae7dxmclgfx5yfxy

Construction of Network Security enforcement Virtual Simulation Experiment and Teaching Platform

Dr. Tudi Premchander
2022 International Journal for Research in Applied Science and Engineering Technology  
Network security enforcement virtual simulation experiment and teaching platform is made with 3 core experimental modules of network security scene enforcement, electronic data scene forensics, and investigation  ...  Abstract: In view of the issues in virtual simulation experiment teaching of network security enforcement, this paper analyzes the need of construction of the virtual simulation experiment teaching platform  ...  Construct a Course System that is "oriented to actual combat, close to reality and practical effect" The cyber security enforcement syllabus system ought to closely follow the commanding style of professional  ... 
doi:10.22214/ijraset.2022.42744 fatcat:252c5aoimrc5tgnjibrc7cm7pe
« Previous Showing results 1 — 15 out of 241,089 results