-
1
-
2
-
3
Emerging international regime of information security
Published 2021-11-01Subjects: “…international information security…”
Get full text
Article -
4
Costs and benefits of business information security
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
5
Information Warfare, Threats and Information Security
Published 2014-12-01Subjects: Get full text
Article -
6
Analysis and Practice of Cloud Computing Information Security
Published 2013-02-01Subjects: Get full text
Article -
7
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: “…information security…”
Get full text
Article -
8
ANALYSIS OF GRID-SYSTEMS INFORMATION SECURITY ASPECTS
Published 2016-10-01“…The article presents the analysis of Grid-systems information security aspects, Also, risk assessment methods, using public databases, expert systems and statistical techniques are proposed.…”
Get full text
Article -
9
Improving the information security sustainability of the economy financial sector
Published 2023-06-01“…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
Get full text
Article -
10
Information Security Risk Management Model for Big Data
Published 2022-01-01“…The essence of information security management is risk management, which is closely related to each other. …”
Get full text
Article -
11
Methodology of Creation and Structure of the Corporate Information Security Unit
Published 2022-11-01Subjects: Get full text
Article -
12
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
13
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01Subjects: “…information security management…”
Get full text
Article -
14
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01“…In order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jintang Generation Co., Ltd., on behalf of units of power generation enterprises, were analyzed. …”
Get full text
Article -
15
Research on coreference resolution technology of entity in information security
Published 2020-02-01Subjects: Get full text
Article -
16
Social financial information security risk analysis and prevention
Published 2016-03-01Subjects: Get full text
Article -
17
Information Security Risk Framework for Digital Transformation Technologies
Published 2025-01-01Get full text
Article -
18
European Union (EU) Information Security Policies Türkay
Published 2013-11-01“…The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. …”
Get full text
Article -
19
Development of multi-agent information security management system
Published 2022-12-01Subjects: “…information security management systems…”
Get full text
Article -
20
INFORMATION SECURITY IN THE COUNTRIES OF CENTRAL ASIA: THE CASE OF KAZAKHSTAN
Published 2016-12-01“…The article discusses the history of the creation and development of the overall concept of information security, the current state of the information security, as well as the appropriate legal and regulatory framework in the countries of Central Asia on the example of the Republic of Kazakhstan. …”
Get full text
Article