Showing 21 - 40 results of 332 for search '"information security"', query time: 0.10s Refine Results
  1. 21
  2. 22

    The Study of Methods for Penetration Testing in Training of Information Security Specialists by A. M. Kadan, A. K. Doronin

    Published 2016-12-01
    “…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    Methodology for determining actual threats to information security in medical information system by V. A. Maystrenko, O. A. Bezrodnykh, R. A. Dorokhin

    Published 2021-11-01
    “…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. …”
    Get full text
    Article
  10. 30

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article