Auswahl der wissenschaftlichen Literatur zum Thema „Computer networks – Security measures – Zimbabwe“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Computer networks – Security measures – Zimbabwe"

1

NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.

Der volle Inhalt der Quelle
Annotation:
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.

Der volle Inhalt der Quelle
Annotation:
This study sought to identify the drivers of mobile money services development in Zimbabwe using Ecocash as a case study. Through purposive sampling, respondents were selected from financial institutions, regulatory bodies, customers, and agents. The research showed that in Zimbabwe the development of mobile money services is influenced by several factors such as a high mobile telephone penetration rate, a high number of unbanked people owing to poor access to traditional banking services, a lower level of internet penetration levels, customer awareness of the service because of aggressive bra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Der volle Inhalt der Quelle
Annotation:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Der volle Inhalt der Quelle
Annotation:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Der volle Inhalt der Quelle
Annotation:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer network
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Der volle Inhalt der Quelle
Annotation:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Der volle Inhalt der Quelle
Annotation:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.

Der volle Inhalt der Quelle
Annotation:
The rising concern for beneficial, easy design and deployable, flexible, reliable, cost effective and scalable wireless network has led to the evolution of mobile Ad hoc networks MANETs . This type of network in its own peculiarity is a wireless, mobile, infrastructure less network technology. It has been found to be very useful in military, commercial, personal, emergency related applications but not without some security challenges. The security of MANET is an important challenge to network engineers due to its unmonitored deployment nature and inherent resource limitation. This paper presen
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Computer networks – Security measures – Zimbabwe"

1

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.

Der volle Inhalt der Quelle
Annotation:
This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants. The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communicat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Davis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.

Der volle Inhalt der Quelle
Annotation:
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the telecommunication industries. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. For example, unlike other wireless networks, MANETs do not require centralized infrastructures such as base stations, and they are arguably more robust due to their avoidance of single point of failures. Interestingly, the attributes that make MANETs attractive as a network paradigm are the same phenomena that compound the challeng
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.

Der volle Inhalt der Quelle
Annotation:
Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities. The main contribution of this work is a scalable monitoring scheme proposed in a Bayesian framework, which allows for detection of multiple attackers by setting a threshold using the Grubbs’ test. Second contrib
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Der volle Inhalt der Quelle
Annotation:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Der volle Inhalt der Quelle
Annotation:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Der volle Inhalt der Quelle
Annotation:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Der volle Inhalt der Quelle
Annotation:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Computer networks – Security measures – Zimbabwe"

1

Oram, Andrew. Beautiful Security. O'Reilly, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

John, Mallery, ed. Hardening network security. McGraw-Hill/Osborne, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Teumim, David J. Industrial network security. 2nd ed. ISA, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Horton, Mike. Network security portable reference. McGraw-Hill, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hunt, Craig. Network Security. O’Reilly Media, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Prentice Hall, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Amine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

J, Stang David. Network security. 6th ed. International Computer Security Association, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Computer networks – Security measures – Zimbabwe"

1

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Stepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ganga, Bhavani P., Tirapathamma S. Lakshmi, SK Reshma, B. Swetha, and N. Himaja. "Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures." In Emerging Trends in Computer Science and Its Application. CRC Press, 2025. https://doi.org/10.1201/9781003606635-42.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Parwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Rohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.

Der volle Inhalt der Quelle
Annotation:
AbstractThe energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to how the system is controlled and managed, with increasing digitalisation of technology and growing complexities across interconnected systems. Traditionally electricity networks adjusted their supply of energy in response to changes in demand. The future energy system will require more flexible demand to be able to use or store energy when renewables are generating. This change is exacerbate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.

Der volle Inhalt der Quelle
Annotation:
AbstractThe drive for automation and constant monitoring has led to rapid development in the field of Machine Learning (ML). The high accuracy offered by the state-of-the-art ML algorithms like Deep Neural Networks (DNNs) has paved the way for these algorithms to being used even in the emerging safety-critical applications, e.g., autonomous driving and smart healthcare. However, these applications require assurance about the functionality of the underlying systems/algorithms. Therefore, the robustness of these ML algorithms to different reliability and security threats has to be thoroughly stu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Der volle Inhalt der Quelle
Annotation:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Aikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.

Der volle Inhalt der Quelle
Annotation:
The modern network and Internet security vulnerabilities expose state and local government networks to numerous threats such as denial of service (DoS) attacks, computer viruses, unauthorized access, confidentiality breaches, and so forth. For example, in June 2005, the state of Delaware saw a spike of 141,000 instances of “suspicious activity” due to a variant of the mytopb worm, which could have brought the state’s network to its knees had appropriate steps not been taken (Jarrett, 2005; National Association of State Chief Information Officers [NASCIO], 2006b). On an average day, the state o
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Computer networks – Security measures – Zimbabwe"

1

Abdullah, Mahfuzul Huda, Mohammed Ayad Alkhafaji, Raaid Alubady, Ghassan Ahmed Ali, and Rajan Verma. "Access Controls and Privacy Measures for Electronic Health Records: Security Perspective." In 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2024. https://doi.org/10.1109/etncc63262.2024.10767555.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Fang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.

Der volle Inhalt der Quelle
Annotation:
Computer forensics is increasingly finding its place in the criminal investigation of criminal offenses in order to shed light on and provide the evidence necessary to initiate criminal proceedings against the perpetrators of crimes that have misused computer technology in criminal activities. Criminal investigation is a procedure of using tactics, techniques and methods aimed at detecting, clarifying and providing evidence through legally prescribed operational-tactical measures and actions, investigative actions and special investigative measures. The Macedonian legislator in the criminal pr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Luna, Ariel, Yair Levy, Gregory Simco, and Wei Li. "Towards Assessing Organizational Cybersecurity Risks via Remote Workers’ Cyberslacking and Their Computer Security Posture." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.5.

Der volle Inhalt der Quelle
Annotation:
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study inc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Cojocariu, Alin ciprian, Ion Verzea, and Rachid Chaib. "THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-062.

Der volle Inhalt der Quelle
Annotation:
Security is an important management issue for all higher education institutions for the safety and security of students, staff and visitors. Also, the potential damages to the institutions can affect their reputation as a result of the incidents related to the crimes. The risk analysis of physical, IT and communications security management in member educational institutions establishes a higher level of security measures to be adopted for all legal objectives, assets and values, and is transposed into the security plan and alarm system design. Starting from the definition of the security manag
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

R. Majeed, Mohammed, and Israa T. Ali. "Review: An Enhancement for Wireless Body Area Network Using Adaptive Algorithms." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1372.

Der volle Inhalt der Quelle
Annotation:
This comprehensive review focuses on Wireless Body Area Networks (WBANs) and their applications, in healthcare exploring both the present and future of this field. The main objectives of this review are threefold; assess the status identify challenges and knowledge gaps and propose new avenues for research and development. The review encompasses aspects of WBANs including energy efficiency, security measures, data rate optimization, congestion control, and integration with emerging technologies. By examining literature and research studies it offers a detailed overview of achievements as well
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

khalid Ibrahim, Rasha. "Article review: Various Efficient Multifactor Methods for User Authentication." In III. International Rimar Congress of Pure, Applied Sciences. Rimar Academy, 2024. https://doi.org/10.47832/rimarcongress03-2.

Der volle Inhalt der Quelle
Annotation:
According to the wide advancements of the networks and computer applications, the cybersecurity become very important to protect data, cybersecurity refers to measures and controls that ensure the confidentiality, integrity and availability of the information, this includes everything from protecting physical information assets, to data security and computer safety practices. One of security principles a user authentication policy is a process that checking while someone is attempting to access services and applications if he is the same person who claim to be or not. Using a password-based au
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Murray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.

Der volle Inhalt der Quelle
Annotation:
Operations has grown beyond relying only on SCADA infrastructure — can you operate without your non-scada infrastructure? As the operator of the world’s longest and most complex liquids pipeline, Enbridge Pipelines Inc. relies heavily on automated systems to control, monitor, maintain our pipeline system. As the scope of automation continues to expand beyond the SCADA control system, so to does the dependence on ancillary computer applications such as pipeline scheduling, electronic ticketing, nominations and oil accounting. Uninterrupted operation of the pipeline system now depends on an incr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!