Academic literature on the topic 'ICT security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICT security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ICT security"

1

Dave, Mayur, and Anand R. Prasad. "ICT Security and Security Testing Aspects." Journal of ICT Standardization 1, no. 2 (2013): 175–86. http://dx.doi.org/10.13052/jicts2245-800x.12a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pasquinucci, Andrea. "Economics of ICT security." Computer Fraud & Security 2008, no. 8 (August 2008): 4–6. http://dx.doi.org/10.1016/s1361-3723(08)70123-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kathane, Rajesh. "Information (ICT) security and Libraries." IP Indian Journal of Library Science and Information Technology 5, no. 1 (July 15, 2020): 43–45. http://dx.doi.org/10.18231/j.ijlsit.2020.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.

Full text
Abstract:
Abstract The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented. Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the modernization of IT systems, which could improve the secure dataflow and ensure continuous exchange of information between the components responsible for the security of the state.
APA, Harvard, Vancouver, ISO, and other styles
5

Hills, Alice. "IV. ICT for Community Security." Whitehall Papers 91, no. 1 (September 2, 2017): 70–83. http://dx.doi.org/10.1080/02681307.2017.1462555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bostan, Atila. "Impact of education on security practices in ICT." Tehnicki vjesnik - Technical Gazette 22, no. 1 (2015): 161–68. http://dx.doi.org/10.17559/tv-20140403122930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meghisan-Toma, Georgeta-Madalina, and Vasile Cosmin Nicula. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 362–70. http://dx.doi.org/10.2478/picbe-2020-0035.

Full text
Abstract:
AbstractThe development of ICT usage in households, by individuals or in enterprises is submitted to the requirements of security. This paper aims a statistical analysis of ICT security aspects from several perspectives: ICT policies, staff awareness of ICT security related issues, ICT security related activities. The methodology used for testing the hypotheses is based on descriptive statistics, chart case study, correlation and factor analysis. The results emphasize the importance of investing resources in cyber security, moreover, in the current pandemic situation generated by COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
8

LAVINA, TATYANA A., and LARISA A. ILINA. "ICT COMPETENCE OF FUTURE INFORMATION SECURITY SPECIALISTS." Cherepovets State University Bulletin 6, no. 105 (2021): 112–28. http://dx.doi.org/10.23859/1994-0637-2021-6-105-10.

Full text
Abstract:
The article focuses on the definition of the ICT competence concept for future information security specialists, as well as its role in the formation of professional competencies. The analysis of professional standards in the field of information security defines the ICT competence of future information security specialists as an integrative personality characteristic that provides flexibility and readiness to adapt to changes in professional activities, the need to learn new software for applied and systemic purposes, including national software products, the use of ICT hardware for solving professional problems according to the current stage of ICT development and the level of the economy digitalization; allows demonstrating ICT skills and abilities for collecting and processing professionally relevant information, skills and abilities of information interaction, automation in the field of professional activity. Based on a survey of 3-4 year students, it is concluded that ICT competence significantly affects the readiness of future information security specialists to carry out their professional activities.
APA, Harvard, Vancouver, ISO, and other styles
9

Akman, İbrahim, and Atila Bostan. "ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY." PEOPLE: International Journal of Social Sciences 3, no. 3 (January 29, 2018): 1046–63. http://dx.doi.org/10.20319/pijss.2018.33.10461063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jacob, Luis, and Ricardo Pocinho. "ICT, Senior universities and digital security." Geopolitical, Social Security and Freedom Journal 2, no. 1 (November 1, 2019): 37–45. http://dx.doi.org/10.2478/gssfj-2019-0004.

Full text
Abstract:
Abstract The Senior Universities (US) in Portugal are socio-educational organisations, of non-formal education, officially recognised by the Resolution of the Council of Ministers nº 76/2016. According to the National Network of Senior Universities (RUTIS), there were 330 US in Portugal with a total of 45,000 senior students in 2019. Since the beginning of the US, computer education has been one of the most sought after topics for seniors. In 2018, 62% of students attended a course related to Information and Communication Technologies (ICT). This teaching has gone through three phases in the US that we will present. In the study carried out by the author to 1,016 senior students from all over the country, it was possible to conclude that the frequency of the US contributed a great deal to diminish digital illiteracy and that it is in the older and less literate public that these contributors are more visible. It was also possible to realise that most US students have smartphones and laptops and understand the evolution that the use of computers has had in the US.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ICT security"

1

Pandey, Bimal Raj. "Indicators for ICT security incident management." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20665.

Full text
Abstract:
Managing the different types and the nature of information security incidents has become a challenging task. However, the use of security incident indicators can improve the capabilities of the incident management process. Indicators are not only needed to assess and monitor the quality of incident management capabilities by quantifying overall processes, but also to provide an early warning and notification of incident occurrences. Though some research work has been initiated for development of measurements and indicators in information security incident management, use of those have been relatively sparse. Also, varied profiles of organizations, changing nature of threats and frequent update and advancement in technology have made it difficult to establish a set of common measurements and indicators. However, there exists significant amount of research, development and implementation of indicators in the safety field. It would be of significant interest to investigate whether safety performance indicators could be adapted to the field of security incident management. In this thesis, a literature study has been performed in the field of safety performance indicators. This study provided us with some results, indicating that effective safety performance indicators could be adapted to the security incident management field. Effective indicators have been adapted to different phases of security incident management through a defined methodology. Those indicators are analysed in detail with their usage, scope, pros and cons in different phases of the incident management process. This thesis also includes a scenario describing the use and implementation of such indicators. It was found that safety indicators could be adapted to the plan, prepare and protect phase, the respond phase and the review phase of an incident management process, and they have been effective to measure the efficiency as well as the capabilities of corresponding phases. For the detection phase, however, it was found that the safety indicators could only be adapted with great difficulties.
APA, Harvard, Vancouver, ISO, and other styles
2

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.
APA, Harvard, Vancouver, ISO, and other styles
3

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Full text
Abstract:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e quello che in realt`a deve essere affrontato realmente. Le attività svolte durante la preparazione della tesi sono state sia di tipo teorico, per quanto concerne lo sviluppo di una metodologia per affrontare al meglio il testing di sistemi di sicurezza a fronte di attacchi mirati, che ne di tipo sperimentale in quanto si sono utilizzati tali concetti per lo svolgimento di test su più strumenti di difesa in uno scenario d’interesse reale.
APA, Harvard, Vancouver, ISO, and other styles
4

Kvastad, Johan. "ICT Security of an Electronic Health Record System: an Empirical Investigation : An in depth investigation of ICT security in a modern healthcare system." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194121.

Full text
Abstract:
An empirical investigation of the security flaws and features of an in-use modern electronic health record system is performed. The investigation was carried out using dynamic analysis, manual testing and interviews with developers. The results indicate that in-use electronic health record systems suffer from serious authentication flaws, arising from the interaction of many different proprietary systems. The authentication problems are so severe that gaining access to any user’s computer on the hospital intranet would compromise a large database of patient medical records, including radiological data regarding the patients. Common web vulnerabilities were also present, such as injections and incorrectly configured HTTP security headers. These vulnerabilities were heavily mitigated by the use of libraries for constructing web interfaces.
En empirisk undersökning av säkerheten inom ett modernt elektroniskt patientjournal-system har utförts. Undersökningen genomfördes med hjälp av dynamisk analys, manuell testning och intervjuer med utvecklarna. Resultatet indikerar att system för elektroniska patientjournaler har stora brister inom autentisering, vilka uppstår p.g.a. att flera olika kommersiella system måste samarbeta. Problemen är så allvarliga att med tillgång till en enda dator på intranätet kan en stor databas med patientdata äventyras, inklusive radiologisk data gällande patienterna. Vanliga websårbarheter fanns också, så som injektioner av skript och inkorrekt konfigurerade HTTP säkerhetsheaders. Dessa sårbarheter mitigerades starkt genom användandet av bibliotek för webinterface.
APA, Harvard, Vancouver, ISO, and other styles
5

Matusík, Jan. "Zavedení managementu bezpečnosti ICT na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224834.

Full text
Abstract:
The aim of this study is aproposal of ICT Security Management implementation in a specific Basic school. Introduction describes the school building, its equipment and existing Security Management. The practical part consists of a discussion about current shortcomings and proposed set of measures for solving the most important problems in terms of management of ICT security.
APA, Harvard, Vancouver, ISO, and other styles
6

Näckros, Kjell. "Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /." Kista : Department of Computer and Systems Sciences, Stockholm University : Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schoffer, Pavel. "Analýza informačního systému ISAD a návrh jeho změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241506.

Full text
Abstract:
This diploma thesis focuses on the information system ISAD owned by ISIT a.c. Primary part of the project is composed of analysis of the system and used technologies. Another part is concentrated on integration of the system for given customer and possibilities of enhancement. Project also contains proposals of new and enhancements of current functionality of the system.
APA, Harvard, Vancouver, ISO, and other styles
8

Tarimo, Charles N. "ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.

Full text
Abstract:
The diploma thesis is focused on the design implementation of information security management system in a small business and is applying theoretical knowledge to real-life situations in a manufacturing company. First of all is performed analysis of current status and the consequent threats which can affect the company's assets. Thereafter are proposed measures based on identified risks and requirements of the owner.
APA, Harvard, Vancouver, ISO, and other styles
10

Sulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.

Full text
Abstract:
The thesis deals with the problems of education in ICT security experts at universities in order to design a strategy for the development of education in present degree courses that dealing with this issue. The theoretical part focuses on the definition of ICT security and to familiarize the reader with the basic concepts of information security management and management of cyber security and gives an overview of the overall development of ICT security and the current trends in this area. It also describes the current situation on the labor market in relation to ICT security and the education of professionals in this field and characterizes the existing recommendations for education in ICT security. Practical part focuses on analyzing the current education ic ICT security and on analyzing the knowledge and skills requirements of the labor market to professionals in this area. Defines the basic professional role and knowledge domains that should be covered by this role. In the analytical part they are evaluated current profiles of graduates Master's degree programs focused on this area in order to find gaps in the knowledge base of graduates based on the requirements of the labor market and the existing recommendations. The results of the analysis are input to define a strategy on education in ICT security, which gives basic recommendations on how to eliminate the shortcomings.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "ICT security"

1

De Capitani di Vimercati, Sabrina, and Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans, eds. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hölbl, Marko, Kai Rannenberg, and Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Janczewski, Lech Jan, and Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Federrath, Hannes, and Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoepman, Jaap-Henk, and Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström, and André Zúquete, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jøsang, Audun, Lynn Futcher, and Janne Hagen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Osservatorio criminalità ICT (2nd 1999? Milan, Italy?). Cyberwar o sicurezza?: II Osservatorio criminalità ICT. Milano; Italy: FrancoAngeli, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quigley, Marian. ICT ethics and security in the 21st century: New developments and applications. Hershey, PA: Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "ICT security"

1

Petiwala, Fatima Farid, Insha Mearaj, and Vinod Kumar Shukla. "Analyzing Cyber Security Breaches." In ICT and Data Sciences, 63–72. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003048862-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rani, T. P., and K. Suganthi. "Data Security in Internet of Things." In ICT with Intelligent Applications, 593–601. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sneha Jain, A., and Lakshmi Satya Vani Narayanam. "Novel Approach to Improve Security Systems." In ICT with Intelligent Applications, 41–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Behnsen, Wolfgang, and Eberhard von Faber. "Usage of the ICT Security Standards." In Secure ICT Service Provisioning for Cloud, Mobile and Beyond, 215–30. Wiesbaden: Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-658-00069-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fuchs, Mathias. "Social Games: Privacy and Security." In ICT Critical Infrastructures and Society, 330–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33332-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mehta, Kaushal, Anmol Sharma, and Lakshya Bhalla. "College Automation Security Management." In Role of ICT in Higher Education, 355–61. Chapters are selected papers from the International Conference on the Role of ICT in Higher Education: Trends, Problems and Prospects, held at the Institute of Information Technology & Management, Delhi, India, on 14th-15th February 2020.: Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003130864-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Şahin, Furkan, H. Fatih Uğurdağ, and Tolga Yalçın. "Combined AES + AEGIS Architectures for High Performance and Lightweight Security Applications." In ICT Innovations 2014, 213–24. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09879-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sridhar, V. "Cyber Security: A Two-Edged Sword!" In Emerging ICT Policies and Regulations, 165–83. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9022-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yesmin, Tahamina, Sarmistha Agasti, and Kisalaya Chakrabarti. "5G Security and Privacy Issues: A Perspective View." In ICT with Intelligent Applications, 89–98. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Motoura, Shota, Ayako Hoshino, and Itaru Hosomi. "Cooperative Hypothesis Building for Computer Security Incident Response." In ICT with Intelligent Applications, 489–97. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ICT security"

1

Visoottiviseth, Vasaka, Rossarin Sainont, Thanatorn Boonnak, and Vorapas Thammakulkrajang. "POMEGA: Security Game for Building Security Awareness." In 2018 Seventh ICT International Student Project Conference (ICT-ISPC). IEEE, 2018. http://dx.doi.org/10.1109/ict-ispc.2018.8523965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Security issues in ICT." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Security issues in ICT." In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ju, Hong-Il, and Jeong-Nyeo Kim. "Security architecture for smart devices." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"AN ICT SECURITY MANAGEMENT FRAMEWORK." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002989304590462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Geon-Woo, and Jong-Wook Han. "Security model for video surveillance system." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paruchuri, Vineetha. "Inter-vehicular communications: Security and reliability issues." In 2011 International Conference on ICT Convergence (ICTC). IEEE, 2011. http://dx.doi.org/10.1109/ictc.2011.6082689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abassi, Ryma, and Sihem Guemara El Fatmi. "Using security policies in a network securing process." In 2011 18th International Conference on Telecommunications (ICT). IEEE, 2011. http://dx.doi.org/10.1109/cts.2011.5898961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Geiger, Gebhard. "ICT Security Risk Management: Economic Perspectives." In 2014 Federated Conference on Computer Science and Information Systems. PTI, 2014. http://dx.doi.org/10.15439/2014f439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katara, Sanjeev Kumar, and Avinash Pokhriyal. "An ICT-based Border Security Framework." In ICEGOV '17: 10th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3047273.3047347.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ICT security"

1

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Full text
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
APA, Harvard, Vancouver, ISO, and other styles
2

Stouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, June 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wendzel, Steffen, and Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Denmark: River Publishers, September 2016. http://dx.doi.org/10.13052/popcas010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, April 2019. http://dx.doi.org/10.17487/rfc8576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Dale, and Emily Schultz-Fellenz. Multi-INT Signature Collection and Exploitation for Security Los Alamos LDRD Report. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1823730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.

Full text
Abstract:
Semiconductors are a key component in fueling scientific progress, promoting economic advancement, and ensuring national security. This issue brief summarizes each component of the semiconductor supply chain and where the United States and its allies possess the greatest leverage. A related policy brief, “Securing Semiconductor Supply Chains,” recommends policy actions to ensure the United States maintains this leverage and uses it to promote the beneficial use of emerging technologies, such as artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, April 2022. http://dx.doi.org/10.18235/0004195.

Full text
Abstract:
This publication reviews the history of digitalization of tax administration in Korea dating back to the 1990s and shares the countrys experience and know-how in building an efficient e-taxation architecture. Its main emphasis is on how the Korean government managed to make the best use of a wide range of taxpayer information efficiently and securely. It highlights information security and presents three case studies of an institutional framework for using third-party data: tax schemes for credit card usage, a cash receipt system, and e-invoicing. It then lays out a range of policy implications for consideration by tax authorities in the Latin American and Caribbean region.
APA, Harvard, Vancouver, ISO, and other styles
9

Brzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, March 2022. http://dx.doi.org/10.55163/tmrz9944.

Full text
Abstract:
Global military expenditure has reached record levels. At the same time, hundreds of millions of people face non-traditional ‘vital’ risks and threats to their security—threats to their lives, livelihoods and dignity. Accelerating climate change and growing loss of biodiversity add unprecedented urgency to investing in people’s security. The concept of human security, as explained in this paper, emphasizes the security of people without neglecting the security of states and state order. The human security approach stresses the necessity to balance the financial needs from all vital risks and threats, regardless of their cause. It logically leads to a reassessment of spending on the military. It also seriously considers the fear that reducing military expenditure will reduce the security of states, a major barrier to past international initiatives to reduce military expenditure. As a first step to initiate the rebalancing, this paper proposes three priority fields of activity to free resources from military spending: (a) arms control and disarmament negotiations and agreements; (b) sector-wide security sector reform for conflict prevention; and (c) financial responsibility in military expenditure and arms procurement. These can be taken without impairing the security of states and state order. If successful, these steps would remove barriers to further military expenditure reductions to improve the human condition in an increasingly dangerous Anthropocene.
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.

Full text
Abstract:
West African women are frequently absent from discussions of community security, despite their substantial contributions to local defense. Women are often viewed primarily as beneficiaries of attempts to reduce local violence, such that their roles in community-based security are typically overlooked. Yet women’s participation in CBAGs holds important implications for the national security of conflict-affected states. Understanding women’s participation in community-based armed groups matters for successful demobilization, disarmament, and reintegration programs and for states’ implementation of the global Women, Peace, and Security agenda, particularly gendered security sector reform. That women have been active—and in some cases instrumental— in establishing and maintaining local security can serve as a point of reference for states seeking to integrate more women into security institutions. Moreover, since CBAG politics are often governed by local norms and practices, understanding how women have become integrated into these local security structures can suggest means of achieving gendered security sector reform that are consistent with and respectful of local customs. This policy note briefly outlines and expounds upon some of the main insights of the author’s recent study on women’s participation in West African CBAGs. It proposes a set of considerations for states and stakeholders to structure efforts around gendered security sector reform.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography