To see the other types of publications on this topic, follow the link: Computer software – Security measures.

Journal articles on the topic 'Computer software – Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer software – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.

Full text
Abstract:
This paper of University Library in the computer network security situation analysis, proposed the threat factors of current university library computer network security faces, proposed the university library computer software maintenance and maintenance measures to ensure the safety of computer network application system in the library.
APA, Harvard, Vancouver, ISO, and other styles
4

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vijayaraghavan, V., Sanjoy Paul, and N. Rajarathnam. "iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts." Information Security Journal: A Global Perspective 19, no. 4 (2010): 213–25. http://dx.doi.org/10.1080/19393551003762223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aituganova, Zh T., B. A. Talpakova, and B. K. Zhussipbek. "EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (2020): 199–206. http://dx.doi.org/10.51889/2020-2.1728-7901.31.

Full text
Abstract:
In the era of rapid technological development, the issue of information security is very relevant. The article discusses issues related to information security in computer systems due to the simple and quick copying of information through communication channels. The problem of information security covers a wide range of issues, from the legislature to a specific technical device. Program developers suggest the need for technical means of protection that provide a high level of information security. Experience has shown that software cannot guarantee information security. Therefore, any softwar
APA, Harvard, Vancouver, ISO, and other styles
7

Aziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Full text
Abstract:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagra
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boutnaru, Shlomi, and Arnon Hershkovitz. "Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language." Interdisciplinary Journal of e-Skills and Lifelong Learning 11 (2015): 123–47. http://dx.doi.org/10.28945/2292.

Full text
Abstract:
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features
APA, Harvard, Vancouver, ISO, and other styles
10

A. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Full text
Abstract:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied t
APA, Harvard, Vancouver, ISO, and other styles
11

Hulak, Hennadii, Volodymyr Buriachok, Pavlo Skladannyi, and Lydia Kuzmenko. "CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 6–28. http://dx.doi.org/10.28925/2663-4023.2020.10.628.

Full text
Abstract:
This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses. A typical sequence of cyberattacks with information encryption using software tools to implement attacks is determined. The sequence of procedures of the WannaCry encryption part is described. The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryptio
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Wan Chen. "Design of Firewall Security Control Program." Applied Mechanics and Materials 556-562 (May 2014): 5999–6002. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5999.

Full text
Abstract:
With the development and popularization of computer network, and speed up the pace of government and enterprise informatization, network architecture and existing enterprises more complex. The complex network structure exposed a lot of security problems, personal and corporate demand for network security grows with hitherto unknown speed. How to let the rapid advance of network security to satisfy business, become a hot topic. Network security is the supporting system of daily office and business applications for the modern enterprises. In the enterprise network, only like a personal computer
APA, Harvard, Vancouver, ISO, and other styles
13

Deng, Qiao, Hui Zhang, Jun Li, Xuejun Hou, and Hao Wang. "Study of Downhole Shock Loads for Ultra-Deep Well Perforation and Optimization Measures." Energies 12, no. 14 (2019): 2743. http://dx.doi.org/10.3390/en12142743.

Full text
Abstract:
Ultra-deep well perforation is an important direction for the development of unconventional oil and gas resources, the security with shock loads is a difficult technical problem. Firstly, the theoretical analysis of perforated string is carried out, the dynamics models of which are established in the directions of axial, radial and circumferential. Secondly, the process of perforating with hundreds of bullets is simulated by using the software of LS-DYNA (ANSYS, Inc, Pennsylvania, USA). The propagation attenuation model of shock loads is established, and a calculation model to predict shock lo
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.

Full text
Abstract:
The scale and complexity of software systems are constantly increasing, imposing new challenges for software fault location and daily maintenance. In this paper, the Security Feature measurement algorithm of Frequent dynamic execution Paths in Software, SFFPS, is proposed to provide a basis for improving the security and reliability of software. First, the dynamic execution of a complex software system is mapped onto a complex network model and sequence model. This, combined with the invocation and dependency relationships between function nodes, fault cumulative effect, and spread effect, can
APA, Harvard, Vancouver, ISO, and other styles
15

Jyothi, G., Ch V. Bhargavi, G. Mani, Ch Usha Kumari, and E. Laxmi Lydia. "Analysis of Various Security Methods of Virtual Machines in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5368–77. http://dx.doi.org/10.1166/jctn.2020.9430.

Full text
Abstract:
Cloud computing can carry both software and hardware applications over the internet, based on the requirement of supplies and services. Hence it acts as the next generation network and computing easy of operations. Security is the at most significant also it influence the cloud computing. Virtualization is the imperative factor through cloud computing related to speed and accuracy. This research work concentrates on the safety of simulated system in virtualized situation. The security problems in virtual machines are summarized first, as well as the safety issues which are present in a virtual
APA, Harvard, Vancouver, ISO, and other styles
16

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these i
APA, Harvard, Vancouver, ISO, and other styles
17

Qadri, Yazdan Ahmad, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim, and Sung Won Kim. "The limitations in the state-of-the-art counter-measures against the security threats in H-IoT." Cluster Computing 23, no. 3 (2020): 2047–65. http://dx.doi.org/10.1007/s10586-019-03036-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Roy Sarkar, Kuheli. "Assessing insider threats to information security using technical, behavioural and organisational measures." Information Security Technical Report 15, no. 3 (2010): 112–33. http://dx.doi.org/10.1016/j.istr.2010.11.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Sangdo, and Jun-Ho Huh. "An effective security measures for nuclear power plant using big data analysis approach." Journal of Supercomputing 75, no. 8 (2018): 4267–94. http://dx.doi.org/10.1007/s11227-018-2440-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Er-rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "New Security Risk Value Estimate Method for Android Applications." Computer Journal 63, no. 4 (2019): 593–603. http://dx.doi.org/10.1093/comjnl/bxz109.

Full text
Abstract:
Abstract Nowadays, mobile applications are the devices’ core, so their security is essential for the platform on which are installed. Therefore, to make this security strong, Android implements permission system and sandboxing mechanism to reduce the attacks contingency. Also, antivirus software is used to detect the already known malware based on their signature, but unfortunately, this kind of program cannot detect cloned or repackaged malware. Thus, using authorizations to estimate the security vulnerability will surely be very useful for avoiding applications that are more susceptible to b
APA, Harvard, Vancouver, ISO, and other styles
21

Ferreira, Ana, and Soraia Teles. "Persuasion: How phishing emails can influence users and bypass security measures." International Journal of Human-Computer Studies 125 (May 2019): 19–31. http://dx.doi.org/10.1016/j.ijhcs.2018.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Das, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.

Full text
Abstract:
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone
APA, Harvard, Vancouver, ISO, and other styles
23

Godi, Sudhakar, and Rajasekhar Kurra. "Novel security issues and mitigation measures in cloud computing: an Indian perspective." International Journal of Computer Applications in Technology 58, no. 4 (2018): 267. http://dx.doi.org/10.1504/ijcat.2018.095946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Godi, Sudhakar, and Rajasekhar Kurra. "Novel security issues and mitigation measures in cloud computing: an Indian perspective." International Journal of Computer Applications in Technology 58, no. 4 (2018): 267. http://dx.doi.org/10.1504/ijcat.2018.10017214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Yu, Heng, Yimin Wang, Feng Wang, and Peiyun Qiu. "Understanding Impacts of Security Check on Passenger Flow in a Metro Station and Improving Measures: A Case Study in Guangzhou, China." Journal of Advanced Transportation 2019 (February 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7438545.

Full text
Abstract:
In order to ensure the safety of passengers using metro stations and staff working at them, some cities choose to set security checks at the entrances of metro stations. There is no doubt that security check can help keep dangerous objects out of a metro station. However, the security check can also slow down the entering speed of passenger flow and lead to congestions that may affect passengers’ travel plans. How security check will impact the passenger flow and how to reduce the impact are questions that need to be addressed. In this study, metro station models were constructed using the bui
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks." International Journal of Cognitive Informatics and Natural Intelligence 8, no. 3 (2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.

Full text
Abstract:
Today's evolving cyber security threats demand new, modern, and cognitive computing approaches to network security systems. In the early years of the Internet, a simple packet inspection firewall was adequate to stop the then-contemporary attacks, such as Denial of Service (DoS), ports scans, and phishing. Since then, DoS has evolved to include Distributed Denial of Service (DDoS) attacks, especially against the Domain Name Service (DNS). DNS based DDoS amplification attacks cannot be stopped easily by traditional signature based detection mechanisms because the attack packets contain authenti
APA, Harvard, Vancouver, ISO, and other styles
27

Fei, Jiaxuan, Qigui Yao, Mingliang Chen, Xiangqun Wang, and Jie Fan. "The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait." Scientific Programming 2020 (November 24, 2020): 1–9. http://dx.doi.org/10.1155/2020/8872482.

Full text
Abstract:
The construction of power Internet of things is an important development direction for power grid enterprises. Although power Internet of things is a kind of network, it is denser than the ordinary Internet of things points and more complex equipment types, so it has higher requirements for network security protection. At the same time, due to the special information perception and transmission mode in the Internet of things, the information transmitted in the network is easy to be stolen and resold, and traditional security measures can no longer meet the security protection requirements of t
APA, Harvard, Vancouver, ISO, and other styles
28

Chang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.

Full text
Abstract:
In this paper, we use the software of ANSYS and MATLAB to do research on early computer warning system. ANSYS can check the intensity of early warning system, and MATLAB can realize the visual function of warning system. In this paper we established the process model of ANSYS intensity checking, and designed the calculation process of order flow. We use the disaster warning when opencast mining to underground mining as an example to verify the model and the algorithm. Through the calculation we get the correlation table between calculated and measured value. Finally we get the biggest stress n
APA, Harvard, Vancouver, ISO, and other styles
29

Jäppinen, Pekka, Mika Yrjölä, and Jari Porras. "Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service." Journal of Communications Software and Systems 1, no. 2 (2017): 107. http://dx.doi.org/10.24138/jcomss.v1i2.308.

Full text
Abstract:
Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with
APA, Harvard, Vancouver, ISO, and other styles
30

Steinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "SECURQUAL: An Instrument for Evaluating the Effectiveness of Enterprise Information Security Programs." Journal of Information Systems 30, no. 1 (2015): 71–92. http://dx.doi.org/10.2308/isys-51257.

Full text
Abstract:
ABSTRACT The ever-increasing number of security incidents underscores the need to understand the key determinants of an effective information security program. Research that addresses this topic requires objective measures, such as number of incidents, vulnerabilities, and non-compliance issues, as indicators of the effectiveness of an organization's information security activities. However, these measures are not readily available to researchers. While some research has used subjective assessments as a surrogate for objective security measures, such an approach raises questions about scope an
APA, Harvard, Vancouver, ISO, and other styles
31

Murugesan, M., P. Balamurugan, J. Santhosh, and G. Arulkumaran. "Threats and Emerging Developments in Cyber Security." Webology 17, no. 2 (2020): 587–98. http://dx.doi.org/10.14704/web/v17i2/web17053.

Full text
Abstract:
Cyber security plays a significant role in science. Data or information security is one of the crucial issues facing the world, when there is discussion about the rapidly growing cyber-crimes, the government and many corporations are taking many steps to stop such crimes. Driven by several different measures, cybercrime continues to expand day by day. In this review, the problems confronting cyber security from emerging technological advances and developments are briefly discussed and, in turn, the paper also reflects on the newest cyber security technologies, trends and other ethics throughou
APA, Harvard, Vancouver, ISO, and other styles
32

Mittal, Ruchi, and M. P. S. Bhatia. "Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications." International Journal of Digital Crime and Forensics 13, no. 1 (2021): 79–93. http://dx.doi.org/10.4018/ijdcf.2021010105.

Full text
Abstract:
In this age, where cryptocurrencies are slowly creeping into the banking services and making a name for them, it is becoming crucially essential to figure out the security concerns when users make transactions. This paper investigates the untrusted users of cryptocurrency transaction services, which are connected using smartphones and computers. However, as technology is increasing, transaction frauds are growing, and there is a need to detect vulnerabilities in systems. A methodology is proposed to identify suspicious users based on their reputation score by collaborating centrality measures
APA, Harvard, Vancouver, ISO, and other styles
33

Rajivan, Prashanth, Pablo Moriano, Timothy Kelley, and L. Jean Camp. "Factors in an end user security expertise instrument." Information & Computer Security 25, no. 2 (2017): 190–205. http://dx.doi.org/10.1108/ics-04-2017-0020.

Full text
Abstract:
Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, externally valid instruments for measuring end-user security expertise are non-existent. Design/methodology/approach A questionnaire encompassing skills and knowledge-based questions was developed to identify critical factors that constitute expertise in end users. Exploratory factor analysis was applied on the results from 898 participants from a wide ran
APA, Harvard, Vancouver, ISO, and other styles
34

Huo, Xiao Jing, Rui Qing Zhang, Hui Wang, Dong Ping Qian, and Jia Xu Teng. "Real-Time Measurement of Friction Coefficient in the Frictional Performance Test of Brake Disk." Key Engineering Materials 373-374 (March 2008): 484–87. http://dx.doi.org/10.4028/www.scientific.net/kem.373-374.484.

Full text
Abstract:
Development and optimizing of friction material formula, oriented to improve the service life and security of brake disk, is largely based on advanced measurement method to accurately provide the friction coefficient. In this study, virtual instrumentation technique was used to design an automation measurement system of friction coefficient. With proper sensors, data of four measured variables such as temperature, rotation speed, pressure and friction torque are acquired by the computer combined with a plug-in data acquisition board. The system work principle, selection of sensors, multi-chann
APA, Harvard, Vancouver, ISO, and other styles
35

Skotnes, Ruth Østgaard. "Management commitment and awareness creation – ICT safety and security in electric power supply network companies." Information & Computer Security 23, no. 3 (2015): 302–16. http://dx.doi.org/10.1108/ics-02-2014-0017.

Full text
Abstract:
Purpose – This paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security within network companies in the electric power supply sector, implementation of awareness creation and training measures for ICT safety and security within these companies and the relationship between these two variables. Design/methodology/approach – Data were mainly collected through a survey among users of ICT systems in network companies within the Norwegian electric power supply sector. In addition, qualitative da
APA, Harvard, Vancouver, ISO, and other styles
36

Gayathri, V. M., and R. Nedunchelian. "Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation." Cluster Computing 22, S1 (2018): 165–76. http://dx.doi.org/10.1007/s10586-018-2004-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yin, Qiang, and Gong Fa Li. "Test Analysis of the 60 Tons Converter." Applied Mechanics and Materials 494-495 (February 2014): 432–35. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.432.

Full text
Abstract:
Converter is the main equipment in steel making, and its work reliability decides the security and economy of steel production. Therefore, how to design and test analysis of converter has been an important subject of industry research. Through the static centric calculation of converter, combining independent software, compute dynamic center and dynamic torque of mass in the process of sampling and the tapping of converter. The reliable operation of converter through qualitative analysis are guaranteed by taking necessary measures.
APA, Harvard, Vancouver, ISO, and other styles
38

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, howev
APA, Harvard, Vancouver, ISO, and other styles
39

Çepik, Hilal, Ömer Aydın, and Gökhan Dalkılıç. "Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device." Proceedings 74, no. 1 (2021): 1. http://dx.doi.org/10.3390/proceedings2021074001.

Full text
Abstract:
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the nece
APA, Harvard, Vancouver, ISO, and other styles
40

Norouzzadeh Gil Molk, Ali Mohammad, Mohammad Reza Aref, and Reza Ramazani Khorshiddoust. "Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications." Computational Intelligence and Neuroscience 2021 (September 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/3583275.

Full text
Abstract:
The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. I
APA, Harvard, Vancouver, ISO, and other styles
41

Saeed A Alqahtani, Mohammed, and Eila Erfani. "Exploring the Relationship Between Technology Adoption and Cyber Security Compliance." International Journal of Electronic Government Research 17, no. 4 (2021): 40–62. http://dx.doi.org/10.4018/ijegr.2021100103.

Full text
Abstract:
IT infrastructure and systems are made up of technical and social systems that work together to ensure that organization's goals and objectives are met. Security controls and measures are developed and used to protect an organization's data and information systems. To improve cyber security, organizations focus most of their efforts on incorporating new technological approaches in products and processes, leaving out the most important and vulnerable factor. So this study intends to provide some practical implications to the technology developers and policymakers while identifying the factors t
APA, Harvard, Vancouver, ISO, and other styles
42

Pan, Wen-Tsao, Yi Liu, Huan Jiang, et al. "Model Construction of Enterprise Financial Early Warning Based on Quantum FOA-SVR." Scientific Programming 2021 (September 15, 2021): 1–8. http://dx.doi.org/10.1155/2021/5018917.

Full text
Abstract:
The sudden outbreak of COVID-19 has a great impact on human life security and global economic development. To deal with the rampant pandemic, many countries have taken strict control measures, including restricting gathering in public places and stopping the production of enterprises; as a result, many enterprises suffered great challenges in survival and development during the pandemic. In order to help enterprises monitor their own financial situation and realize their healthy development under the pandemic, this paper constructs an Enterprise Financial Early Warning Model, in which Quantum
APA, Harvard, Vancouver, ISO, and other styles
43

Pecheniuk, A. V. "Conceptual principles for ensuring effective protection of information in the context of economic security of the enterprise." Ekonomìka ta upravlìnnâ APK, no. 1 (155) (May 21, 2020): 84–92. http://dx.doi.org/10.33245/2310-9262-2020-155-1-84-92.

Full text
Abstract:
The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative leg
APA, Harvard, Vancouver, ISO, and other styles
44

Alshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.

Full text
Abstract:
Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibi
APA, Harvard, Vancouver, ISO, and other styles
45

Hidayat, Rahmat, Iwan Tri Riyadi Yanto, Azizul Azhar Ramli, and Mohd Farhan Md Fudzee. "Similarity measure fuzzy soft set for phishing detection." International Journal of Advances in Intelligent Informatics 7, no. 1 (2021): 101. http://dx.doi.org/10.26555/ijain.v7i1.605.

Full text
Abstract:
Phishing is a serious web security problem, and the internet fraud technique involves mirroring genuine websites to trick online users into stealing their sensitive information and taking out their personal information, such as bank account information, usernames, credit card, and passwords. Early detection can prevent phishing behavior makes quick protection of personal information. Classification methods can be used to predict this phishing behavior. This paper presents an intelligent classification model for detecting Phishing by redefining a fuzzy soft set (FSS) theory for better computati
APA, Harvard, Vancouver, ISO, and other styles
46

Et.al, DR B. BARACKATH. "“The Impact Of Digital Wallets Threats And Safety Measures On The Level Of Usage” – A Study With Reference To Chennai." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 95–100. http://dx.doi.org/10.17762/turcomat.v12i6.1272.

Full text
Abstract:
Digital wallet refers to an electronic system that enables a person to make purchases on a commodity or commodity class basis. It is a device that safely stores the payment details and password of consumers for the variety of payment methods and websites. The wallet may be Computer, Web, Smartphone or hardware wallets. Any payment by online format is subject to the limitations and threats of data security, which contribute to an increase in safety awareness of the use of information. Electronic wallets are used in the banking, investment, insurance, retail, educational, travel, entertainment a
APA, Harvard, Vancouver, ISO, and other styles
47

Song, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.

Full text
Abstract:
In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management m
APA, Harvard, Vancouver, ISO, and other styles
48

Carrillo-Mondejar, Javier, Juan Manuel Castelo Gomez, Carlos Núñez-Gómez, Jose Roldán Gómez, and José Luis Martínez. "Automatic Analysis Architecture of IoT Malware Samples." Security and Communication Networks 2020 (October 26, 2020): 1–12. http://dx.doi.org/10.1155/2020/8810708.

Full text
Abstract:
The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges eve
APA, Harvard, Vancouver, ISO, and other styles
49

Steinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions." Journal of Information Systems 27, no. 2 (2013): 65–86. http://dx.doi.org/10.2308/isys-50510.

Full text
Abstract:
ABSTRACT Internal auditors and information security professionals both play important roles in protecting an organization's assets. Indeed, there are potential synergistic benefits if they work together. The relationship between the two functions, however, is not always supportive. This paper presents the results of a survey of information security professionals' perceptions about the nature of the relationship between the information security and internal audit functions in their organization. We find that information security professionals' perceptions about the level of technical expertise
APA, Harvard, Vancouver, ISO, and other styles
50

Karlsson, Fredrik, Martin Karlsson, and Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism." Information & Computer Security 25, no. 3 (2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.

Full text
Abstract:
Purpose This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives. Design/methodology/approach A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares. Findings The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, thei
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!