9,298 Hits in 3.6 sec

Better Securing an Infrastructure for Telework

Loreen Marie Butcher-Powell
2006 Journal of Cases on Information Technology  
The XYZ Hardware Company, Inc. infrastructure features high volumes of sensitive and confidential corporate data relevant to internal and external transactions.  ...  The OCTAVE SM Model has proven to be helpful for XYZ by identifying over 198 potential security breaches.  ...  Software consists of applications and services such as operating systems, database applications, networking software, office applications, e-mail applications, and security applications that process, store  ... 
doi:10.4018/jcit.2006100106 fatcat:l5cpvpz76jbbdkzxcr64jzexde

Choosing IT Platforms In The Age Of Stuxnet

Mohammad Dadashzadeh
2017 Journal of Cybersecurity Research (JCR)  
These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication  ...  This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns.  ...  vulnerability management, endpoint security protection • Device Security -Device hardening, protecting the actual hardware, controllers, drives, motors, valves, and other automation and control devices  ... 
doi:10.19030/jcr.v2i1.10076 fatcat:5wlg6wjagvhoxbdq3lnqffn7wa

Must-Have Capabilities for Enterprise Mobility: A South African Study

B-Abee Toperesu, Jean-Paul Van Belle
2016 Social Science Research Network  
Mobile devices represent a difficult information technology decision for organizations, commonly referred to as the "Bring-Your-Own-Device" (BYOD) issue.  ...  We conclude with a proposed list of the must-have capabilities for Enterprise Mobility.  ...  "Enterprise mobility it's about basically securing information on mobile devices" (P4). Most participants feel there is a need to have mobile applications made specifically to run on mobile devices.  ... 
doi:10.2139/ssrn.3282337 fatcat:ssc6eloyszgulex7dlldcxmlj4

It Systems Security Management in Migration Process

Sylwester Pięta
2010 Foundations of Management  
Also, guidelines for improvement of security in migration process were presented.  ...  This paper looks at the issue of IT systems migration as well as problems related to security policy in migration processes.  ...  Hardware gates Wireless Network hardware security Radius / Diameter Servers IDS/IPS Wireless hardware systems Application server [online].  ... 
doi:10.2478/v10238-012-0029-4 fatcat:sbkmnuw55zaibg64tz554kdwvu

Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems

Ki Hoon Kim, Jung ho Eom
2016 International Journal of Security and Its Applications  
Gravity refers to the weakest part of the enemy (security holes), and the security holes that cause the most decisive effects when cyber-attacks are happening.  ...  Cyber target selection is carried out with 3 components such as 'center of gravity', 'target attribute and control characteristics', and 'type and characteristics of information communication system'.  ...  The figure below shows the target selection (center-feature-composition) for paralysis strategic command and control function. The infrastructure component corresponds to hardware.  ... 
doi:10.14257/ijsia.2016.10.11.24 fatcat:ybseyd6wevb6xdjrnrwpevnvey


Pál Michelberger, Pál Fehér-Polgár
2020 Journal of Security and Sustainability Issues  
The classical PDCA cycle is adaptable at development and maintenance of BYOD security framework.  ...  Moreover, most companies have not even come to a strategic decision whether to ban, tolerate or encourage BYOD yet.  ...  Hardware security keys do not make use of IT devices easier either.  ... 
doi:10.9770/jssi.2020.9.4(1) fatcat:3fmk6yifsjajpdmp2ccv2axlby

Cloud Computing: New Paradigms and Challenges [chapter]

Djamshid Tavangarian
2016 Advances in Intelligent Systems and Computing  
Cloud computing is an Internet-based distributed system architecture to provide the customers with services and resources in a scalable and self-manageable fashion.  ...  Services are furnished by software whereas resources are a complex of virtualized computing facilities, storages, and networking hardware provided by the Cloud for end users and enterprises.  ...  It will then also illustrate how the solution can be leveraged in context of different applications to identity business, strategic, technical, and implementation challenges and find solutions for different  ... 
doi:10.1007/978-3-319-40415-8_1 fatcat:atgp6c5olffzrn5kdaaakmrlg4

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Maximo Giovani Tanzado Espinoza, Joseline Roxana Neira Melendrez, Luis Antonio Neira Clemente
2020 Advances in Science, Technology and Engineering Systems  
protect the information assets to minimize the threats of the information processed, collected and transported by interconnected applications; is an element in information security [6] ; cybersecurity  ...  own IoT devices and information; the devices of doctors or patients are not considered.  ...  is a strategic mechanism for improvement and changes in IoT and increases the environment security; it also ensures that an infrastructure has connected devices in a safe environment and with appropriate  ... 
doi:10.25046/aj050364 fatcat:usao3yirordojo7bnysjorzn3u

Three Level Cloud Computing Security Model

Pooja Sharma, Rajkumar Singh Rathore
2015 International Journal of Computer Applications  
Thirdly, while sending a mail to someone through network is done with the help of AES (Advanced Encryption Standard).  ...  This paper proposes a methodology to over come the security threats that can take place on three levels i.e login authentication, network security and Storage Security.  ...  Security Requirements: Hardware Security, hardware reliability, network protection, legal not abusive use of cloud and network resources protection [3] .  ... 
doi:10.5120/21042-3656 fatcat:m726crx73bf2vhuajwsleyiozy

A Smart Ammunition Library Management System Based on Raspberry Pie

Kai Zhou, Youhong Yuan
2020 Procedia Computer Science  
Camera modules, sensors and other devices pass through the serial port.  ...  Camera modules, sensors and other devices pass through the serial port.  ...  The Raspberry Pi has the ability to interact with the outside world and is widely used in some digital device projects, with powerful computing performance and ease of use of open source hardware.  ... 
doi:10.1016/j.procs.2020.02.041 fatcat:df6q7atxlje6tdst77ovd24ljy

Book Review of Information Technology for Librarians and Information Professionals

Rui Jeff Ge
2021 International Journal of Librarianship (IJoL)  
Chapter 3 begins with some basic technical details of hardware components of computers (e.g., CPU, motherboard, ROM, RAM, mass storage, physical ports connecting peripherals, I/O devices), and then continues  ...  The chapter concludes with two development-related topics: application programming interfaces (APIs) and open-source software.  ... 
doi:10.23974/ijol.2021.vol6.2.216 fatcat:bbk23nsmlfembo2zxhaul7chlu

Your firm's mobile devices: How secure are they?

Harry R. Wright Jr., J. Lowell Mooney, Abbie Gail Parham
2011 Journal of Corporate Accounting & Finance  
With the world's rapid adoption of Web 2.0 wireless technology and expanded bandwidth, coupled with the rapid deployment of ever more powerful mobile hardware and applications, these devices, which include  ...  Know which back-office systems employees need to access: Have you identified which employees can suffice with just e-mail access vs. which need special purpose applications vs. which need executive-level  ...  Do an assessment-or at least be aware-of the encryption options available for mobile devices. Some devices may offer more mature security solutions than others. c.  ... 
doi:10.1002/jcaf.20701 fatcat:qol5jacrgre7tmq2n3m7qhnzpu

A research program in computer technology

1987 Decision Support Systems  
The hardware staff performed upgrades and additjim, to the hardware configurations on the DEC 2060 (including security improvements). An additional change included more memorN on ISLA.  ...  The work].with the on-call hardware and soft are support staff in resohing .,y.tem problem.  ... 
doi:10.1016/0167-9236(87)90137-0 fatcat:pa4yam4ywbdy3ijbdf7pehknki

Information System Strategic Planning for M Group

Lily Damayanti, Teofilus Sunarsa, Yuki Gunawan
2020 Tech-E  
System(IS) strategy and future application portfolio.  ...  Along with the rapid growth of the company there are problems of how to make use the Information Technology department as optimal as possible and how to build a blue print of it strategy in handling a  ...  Table 8 and Table 9 are the following hardware and software specifications table with prices: Table 10 shows the human resources needed and overall costs for developing the proposed application of  ... 
doi:10.31253/te.v3i2.301 fatcat:mg4odrom7nfhrehiejded7jpve

Proposed Practices To Mitigate Significant Mobility Security Risks

Johanna Catherina Brand, Wandi Kruger-Van Renen, Riaan Rudman
2014 International Business & Economics Research Journal  
This study provides organisations with guidance on how to govern these enterprise mobility security risks in an effective manner at both a strategic and an operational level.  ...  Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations information.  ...  It is estimated that mobile devices will overtake personal computers as the preferred web access device (Meeker & Wu, 2013) .  Apple's App Store was introduced in July 2008 with approximately 800 applications  ... 
doi:10.19030/iber.v14i1.9072 fatcat:ku5orwdmqvei5lbpygqoet6nju
« Previous Showing results 1 — 15 out of 9,298 results