Buscar
Mostrando ítems 1-10 de 3401
Information Security Policy Compliance: Usefulness and Ease of Use
(Springer Link, 2023)
Various information security (IS) standards and frameworks have been proposed with the objective of safeguarding an organization’s information assets. The Information Security Policy (ISP) is one of the tools for managing ...
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...
Security and defence policy documents: a new dataset
(2021)
Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This ...
FORTUNA-A framework for the design and development of hardware-based secure systems
(Elsevier Science IncNew YorkEUA, 2013)
Education, Training, Awareness, Knowledge, and Compliance with the Information Security Policy
(RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, 2023)
Due to information security’s (IS) importance in protecting organizations’ data, international standards, norms, and best practices have been proposed for managing IS. Organizations establish the information security ...
Security strategy for vulnerabilities prevention in the development of web applications
(IOP Publishing, 2019)
In recent years, Higher Education Institutions through their Systems departments have
strengthened security for the development of applications on web environment, because of their
vulnerability to possible computer ...
Gestão da segurança da informação no ambiente do TCE/RN: uma abordagem em conformidade com requisitos legais
(Universidade Federal do Rio Grande do NorteBrasilUFRNResidência em Tecnologia da Informação, 2021)
Política de segurança da informação: uma estratégia para garantir a proteção e a integridade das informações arquivísticas no Departamento de Arquivo Geral da UFSM
(Universidade Federal de Santa MariaBRHistóriaUFSMPrograma de Pós-Graduação em Patrimônio Cultural, 2012-12-06)
Presents a study on information security in order to propose an Information Security
Policy for the Department of General Archives (DAG), Federal University of Santa Maria
(UFSM) as a way of enabling the protection, ...
Constructing an architecture-based cybersecurity solution for a system
(2023-01-19)
Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a ...