• No results found

Information technology - Security measures

Information Technology (IT) Security 
                      Management in Kenyan Small and Medium  
                      Enterprises (SMEs)

Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)

... of Information Technology (IT) security in Kenyan Small and Medium Enterprises ...IT security, whether SMEs seek external expertise about IT security where it is not internally ...

9

Information Security for Organizations and Accounting Information Systems A Jordan Banking Sector Case

Information Security for Organizations and Accounting Information Systems A Jordan Banking Sector Case

... of information security and control procedures for organizations that are expected to be used within Accounting Information Systems (AIS): security and general control for organizations; ...

15

INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES

INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES

... lack security measures concerning smartphone usage are significant since they had p-values that were less than ...and technology on smartphone security, lack of security habits and ...

15

CURBING MISBEHAVIOUR WITH INFORMATION SECURITY MEASURES: AN EMPIRICAL EVIDENCE FROM A CASE STUDY

CURBING MISBEHAVIOUR WITH INFORMATION SECURITY MEASURES: AN EMPIRICAL EVIDENCE FROM A CASE STUDY

... the information technology to the more advanced ...that security is a major hindrance of cloud adoption (Abdul Hamid & Mohd Yusof, 2015; Abdul Hamid & Yusof, ...solve information ...

11

INFORMATION SECURITY: AN OVERVIEW

INFORMATION SECURITY: AN OVERVIEW

... Securing information, whether technology or human based, is performed through effective and efficient management ...human-based security risk reduction involves system risk analysis, hiring of ...

11

ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS

ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS

... individual information. Social media assumes a colossal part in cyber security and will contribute a great deal too individual cyber ...private information and taking profitable ...own ...

8

Advances in Enterprise Information Technology Security pdf

Advances in Enterprise Information Technology Security pdf

... Oftentimes, security practi- tioners consider security as being a step behind electronic ...Securing information encompasses authenticating the source of a message, verifying the integrity of the ...

389

Security Measures  To Protect The Risk Management In The E Voting Technology

Security Measures To Protect The Risk Management In The E Voting Technology

... An Electronic voting (E-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. E-voting may become the quickest, cheapest, and the most ...

11

ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS

ANALYSIS ON CYBER SECURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS

... cyber security" are established in military ...electronic measures, for example, sticking an enemy's ...barrier measures and the troublesome issues identified with deciding when such ...

8

AN INTRODUCTION TO CYBER CRIMES AND ROLE OF CYBER-SECURITY IN INFORMATION TECHNOLOGY

AN INTRODUCTION TO CYBER CRIMES AND ROLE OF CYBER-SECURITY IN INFORMATION TECHNOLOGY

... Cyber security awareness and absence of Cyber security preventive measures taken while utilizing the internet ...cyber security chance should be taken care of by recognizing dangers and ...

8

The Role of Biometric Technology in Information Security

The Role of Biometric Technology in Information Security

... The use of biometric technologies provides reliable verification of the passengers crossing state borders, and strengthens the control of passport and visa regulations, and other identification documents. The recognition ...

5

An intelligent tutoring system for teaching advanced topics in information security

An intelligent tutoring system for teaching advanced topics in information security

... in Information Security by using ITSB authoring ...in Information Security to students and overcome the difficulties they face with ease and ...

9

betsyford.pdf

betsyford.pdf

... institutional information was once a well-defined, somewhat linear ...onsite information technology services assumed a role in managing the lifecycle of digital ...content. Information systems ...

48

A survey of artificial intelligence for enhancing the information security

A survey of artificial intelligence for enhancing the information security

... growing technology there are some problems – cannot act any different from what they are programmed to do, machines lack of common sense, eventually will replace humans in every field and will lead to ...

7

Securing Routing Protocol BGP

Securing Routing Protocol BGP

... IP hijacking at times termed to as BGP hijacking, prefix hijacking or maybe path hijacking. Prefix hijacking would be the unauthorized control group of IP addresses by corrupting Internet routing tables. The routers ...

7

A New Construction Scheme for Information Security Lab

A New Construction Scheme for Information Security Lab

... The security devices used in lab should have strong practica- ...mainstream security devices and soft- ware in the market, combine with the mainstream command line configuration so that the students can ...

7

RDBMS on Digital Watermarking Technology

RDBMS on Digital Watermarking Technology

... 1) Multimedia data objects usually consist of large numbers of bits with redundancy in which plenty of digital watermarking information can be stored. In relational database, a great many independent unique tuples ...

6

Creation of Integrated of Industrial Security with the use of Modern Information Technology

Creation of Integrated of Industrial Security with the use of Modern Information Technology

... Being developed on the same basic software, EIS and EPKS system provide unified software toolkits and ensure the principle of databases sharing by creating, ultimately, a global cross-servers database. Thus, with proper ...

6

Implementing security framework of electronic business application

Implementing security framework of electronic business application

... Security defines as measures and control that ensure confidentiality, integrity, availability and accountability of the information processed and stored by a computer [Valenti, Cuccharel[r] ...

24

DDoS Detection using Hybrid technique of PSO and Fire Fly

DDoS Detection using Hybrid technique of PSO and Fire Fly

... Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or ...

5

Show all 10000 documents...

Related subjects