Academic literature on the topic 'Computer networks – Security measures – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Security measures – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks – Security measures – Zimbabwe"

1

NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.

Full text
Abstract:
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the
APA, Harvard, Vancouver, ISO, and other styles
2

Mtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.

Full text
Abstract:
This study sought to identify the drivers of mobile money services development in Zimbabwe using Ecocash as a case study. Through purposive sampling, respondents were selected from financial institutions, regulatory bodies, customers, and agents. The research showed that in Zimbabwe the development of mobile money services is influenced by several factors such as a high mobile telephone penetration rate, a high number of unbanked people owing to poor access to traditional banking services, a lower level of internet penetration levels, customer awareness of the service because of aggressive bra
APA, Harvard, Vancouver, ISO, and other styles
3

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
5

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer network
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Nwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.

Full text
Abstract:
The rising concern for beneficial, easy design and deployable, flexible, reliable, cost effective and scalable wireless network has led to the evolution of mobile Ad hoc networks MANETs . This type of network in its own peculiarity is a wireless, mobile, infrastructure less network technology. It has been found to be very useful in military, commercial, personal, emergency related applications but not without some security challenges. The security of MANET is an important challenge to network engineers due to its unmonitored deployment nature and inherent resource limitation. This paper presen
APA, Harvard, Vancouver, ISO, and other styles
10

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks – Security measures – Zimbabwe"

1

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.

Full text
Abstract:
This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants. The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communicat
APA, Harvard, Vancouver, ISO, and other styles
3

Dong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Davis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the telecommunication industries. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. For example, unlike other wireless networks, MANETs do not require centralized infrastructures such as base stations, and they are arguably more robust due to their avoidance of single point of failures. Interestingly, the attributes that make MANETs attractive as a network paradigm are the same phenomena that compound the challeng
APA, Harvard, Vancouver, ISO, and other styles
5

Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.

Full text
Abstract:
Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities. The main contribution of this work is a scalable monitoring scheme proposed in a Bayesian framework, which allows for detection of multiple attackers by setting a threshold using the Grubbs’ test. Second contrib
APA, Harvard, Vancouver, ISO, and other styles
6

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO, and other styles
7

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Full text
Abstract:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature
APA, Harvard, Vancouver, ISO, and other styles
9

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
10

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Full text
Abstract:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks – Security measures – Zimbabwe"

1

Oram, Andrew. Beautiful Security. O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

John, Mallery, ed. Hardening network security. McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teumim, David J. Industrial network security. 2nd ed. ISA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horton, Mike. Network security portable reference. McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hunt, Craig. Network Security. O’Reilly Media, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Amine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

J, Stang David. Network security. 6th ed. International Computer Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks – Security measures – Zimbabwe"

1

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganga, Bhavani P., Tirapathamma S. Lakshmi, SK Reshma, B. Swetha, and N. Himaja. "Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures." In Emerging Trends in Computer Science and Its Application. CRC Press, 2025. https://doi.org/10.1201/9781003606635-42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.

Full text
Abstract:
AbstractThe energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to how the system is controlled and managed, with increasing digitalisation of technology and growing complexities across interconnected systems. Traditionally electricity networks adjusted their supply of energy in response to changes in demand. The future energy system will require more flexible demand to be able to use or store energy when renewables are generating. This change is exacerbate
APA, Harvard, Vancouver, ISO, and other styles
8

Hanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.

Full text
Abstract:
AbstractThe drive for automation and constant monitoring has led to rapid development in the field of Machine Learning (ML). The high accuracy offered by the state-of-the-art ML algorithms like Deep Neural Networks (DNNs) has paved the way for these algorithms to being used even in the emerging safety-critical applications, e.g., autonomous driving and smart healthcare. However, these applications require assurance about the functionality of the underlying systems/algorithms. Therefore, the robustness of these ML algorithms to different reliability and security threats has to be thoroughly stu
APA, Harvard, Vancouver, ISO, and other styles
9

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Full text
Abstract:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administ
APA, Harvard, Vancouver, ISO, and other styles
10

Aikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.

Full text
Abstract:
The modern network and Internet security vulnerabilities expose state and local government networks to numerous threats such as denial of service (DoS) attacks, computer viruses, unauthorized access, confidentiality breaches, and so forth. For example, in June 2005, the state of Delaware saw a spike of 141,000 instances of “suspicious activity” due to a variant of the mytopb worm, which could have brought the state’s network to its knees had appropriate steps not been taken (Jarrett, 2005; National Association of State Chief Information Officers [NASCIO], 2006b). On an average day, the state o
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks – Security measures – Zimbabwe"

1

Abdullah, Mahfuzul Huda, Mohammed Ayad Alkhafaji, Raaid Alubady, Ghassan Ahmed Ali, and Rajan Verma. "Access Controls and Privacy Measures for Electronic Health Records: Security Perspective." In 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2024. https://doi.org/10.1109/etncc63262.2024.10767555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.

Full text
Abstract:
Computer forensics is increasingly finding its place in the criminal investigation of criminal offenses in order to shed light on and provide the evidence necessary to initiate criminal proceedings against the perpetrators of crimes that have misused computer technology in criminal activities. Criminal investigation is a procedure of using tactics, techniques and methods aimed at detecting, clarifying and providing evidence through legally prescribed operational-tactical measures and actions, investigative actions and special investigative measures. The Macedonian legislator in the criminal pr
APA, Harvard, Vancouver, ISO, and other styles
5

Luna, Ariel, Yair Levy, Gregory Simco, and Wei Li. "Towards Assessing Organizational Cybersecurity Risks via Remote Workers’ Cyberslacking and Their Computer Security Posture." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.5.

Full text
Abstract:
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study inc
APA, Harvard, Vancouver, ISO, and other styles
6

Cojocariu, Alin ciprian, Ion Verzea, and Rachid Chaib. "THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-062.

Full text
Abstract:
Security is an important management issue for all higher education institutions for the safety and security of students, staff and visitors. Also, the potential damages to the institutions can affect their reputation as a result of the incidents related to the crimes. The risk analysis of physical, IT and communications security management in member educational institutions establishes a higher level of security measures to be adopted for all legal objectives, assets and values, and is transposed into the security plan and alarm system design. Starting from the definition of the security manag
APA, Harvard, Vancouver, ISO, and other styles
7

R. Majeed, Mohammed, and Israa T. Ali. "Review: An Enhancement for Wireless Body Area Network Using Adaptive Algorithms." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1372.

Full text
Abstract:
This comprehensive review focuses on Wireless Body Area Networks (WBANs) and their applications, in healthcare exploring both the present and future of this field. The main objectives of this review are threefold; assess the status identify challenges and knowledge gaps and propose new avenues for research and development. The review encompasses aspects of WBANs including energy efficiency, security measures, data rate optimization, congestion control, and integration with emerging technologies. By examining literature and research studies it offers a detailed overview of achievements as well
APA, Harvard, Vancouver, ISO, and other styles
8

khalid Ibrahim, Rasha. "Article review: Various Efficient Multifactor Methods for User Authentication." In III. International Rimar Congress of Pure, Applied Sciences. Rimar Academy, 2024. https://doi.org/10.47832/rimarcongress03-2.

Full text
Abstract:
According to the wide advancements of the networks and computer applications, the cybersecurity become very important to protect data, cybersecurity refers to measures and controls that ensure the confidentiality, integrity and availability of the information, this includes everything from protecting physical information assets, to data security and computer safety practices. One of security principles a user authentication policy is a process that checking while someone is attempting to access services and applications if he is the same person who claim to be or not. Using a password-based au
APA, Harvard, Vancouver, ISO, and other styles
9

Murray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.

Full text
Abstract:
Operations has grown beyond relying only on SCADA infrastructure — can you operate without your non-scada infrastructure? As the operator of the world’s longest and most complex liquids pipeline, Enbridge Pipelines Inc. relies heavily on automated systems to control, monitor, maintain our pipeline system. As the scope of automation continues to expand beyond the SCADA control system, so to does the dependence on ancillary computer applications such as pipeline scheduling, electronic ticketing, nominations and oil accounting. Uninterrupted operation of the pipeline system now depends on an incr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!