• No results found

Development and security

The development-security nexus and security sector reform

The development-security nexus and security sector reform

... human development entitlements. The securitisation of development ties development assistance to the security agenda to prevent conflicts and it gives particular attention to the governance of ...

211

The Security Development Lifecycle

The Security Development Lifecycle

... meaningful security MANDATORY for products that are exposed to meaningful security risk risk EVOLVING and new factors, such as privacy, are being added EVOLVING and new factors, such as privacy, are being ...

22

Security, Privacy, and Technology Development: The Impact on National Security

Security, Privacy, and Technology Development: The Impact on National Security

... I. I NTRODUCTION The evolution of modern communications and information technol- ogy sparked a revolution of unprecedented proportions, bringing about an explosion in terms of users and capabilities, as well as in- ...

38

Information Security Development Trends

Information Security Development Trends

... Information security has developed over the last 50 years due to different development trends that have an influence on the information security ...Information security development ...

8

Modern Application Development Security

Modern Application Development Security

... application security has matured, no single testing technique has helped development teams mitigate all security ...their security needs. While most provide developers with some level of ...

27

peace, Security and Development in BRICS

peace, Security and Development in BRICS

... that security in the use of Information and Communication Technologies (ICTs) through universally accepted norms, standards and practices is of paramount ...

15

Data Security in Development & Testing

Data Security in Development & Testing

... Ponemon Institute © Research Report Page 11 V. Concluding thoughts Sensitive and confidential data is at risk in the testing and development process. The most likely threats to this data based on research and ...

18

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

... software development methods because many security activities are added to the traditional software life cycle ...software development methods, it enhances the safety of system by maintaining the ...

8

HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA

HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA

... human security or what conditions represent a situation of human insecurity, I organised with a Cambodian NGO working in Battambang to visit the province where I could take up this research with individuals and ...

255

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle

... application security can help save around $600K annually from defect prevention together with $280K savings in increased developer efficiency and productivity (reduce time spent to fix a ...avoid security ...

15

Software Development: The Next Security Frontier

Software Development: The Next Security Frontier

... the security of software, especially those in the government, critical infrastructure and enterprise ...the development lifecycle, (ISC)²‟s CSSLP is helping the industry take an important step forward in ...

33

Cloud computing Its development and security

Cloud computing Its development and security

... physical security, and power backup, and the use of commodity ...laptop). Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud ...

13

The Development of the Security Network

The Development of the Security Network

... Project Organisation STEERING GROUP MINISTRY OF INTERIOR MINISTRY OF DEFENCE MINISTRY OF FINANCE INFORMATION NETWORK PROJECT ITC-SOLUTIONS DEVELOPMENT PROJECT - PROJECT GROUP.[r] ...

15

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective

... Information Analysis (Hughes) Infrastructure Protection (Liscouski) Risk Assessment Division Indications and Warning Division National Cyber Security Division Protective Security Divisio[r] ...

23

Development and analysis of security policies in security enhanced Android

Development and analysis of security policies in security enhanced Android

... the security goals can still be ...its security goals? Is it as simple as replacing the functions in the separate calendar applications that access the content providers with functions that access the cloud ...

122

Security Engineering: Development of Curriculum and Research for Homeland Security

Security Engineering: Development of Curriculum and Research for Homeland Security

... different aspects of security and variety of operations from helping to defend the U.S.A. against threats, to providing timely and effective support in response to natural disasters. • DHS and its sub-agencies ...

38

Cyber Security Research and Development a Homeland Security Perspective

Cyber Security Research and Development a Homeland Security Perspective

... the security of existing deployed technologies and to ensure the security of new emerging systems; To develop new and enhanced technologies for the detection of, prevention of, and response to cyber attacks ...

31

Security within a development lifecycle. Enhancing product security through development process improvement

Security within a development lifecycle. Enhancing product security through development process improvement

... for secure software, feeling assured that your vendor is taking your security concerns seriously..  As a developer, a realization and help to incorporate.[r] ...

22

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT

... THE IMPACT OF REMEDIATION ON THE ABILITY TO RELEASE APPLICATIONS ON TIME AND ON BUDGET As discussed earlier, application developers are taking the precaution of running vulnerability scans, but even the most ...

8

Development of a Model for Security and Usability

Development of a Model for Security and Usability

... 4.3.5 Threats to Validity Until we find other systematic reviews focusing on the taxonomy of the relationship between security and usability, we will not be able to validate our study externally. Regarding ...

74

Show all 10000 documents...

Related subjects