• No results found

security controls

FACTORS AFFECTING APPLICABILITY OF SECURITY CONTROLS IN COMPUTERIZED ACCOUNTING SYSTEMS

FACTORS AFFECTING APPLICABILITY OF SECURITY CONTROLS IN COMPUTERIZED ACCOUNTING SYSTEMS

... in security controls implementation and how employees respond to the need for having a high quality security system in the Computerized Accounting ...the security system in protecting their ...

16

IoT Vulnerability Analysis and Its Security Controls 

IoT Vulnerability Analysis and Its Security Controls 

... of security controls for the less-controlled IoT ...a security solution to remove malware from infected IoT devices, or to stop the activation of malware (deletion of registry, exe, or ...general ...

7

Mapping the coverage of security controls in cyber insurance proposal forms

Mapping the coverage of security controls in cyber insurance proposal forms

... minimum security controls that will be ...the controls mentioned will lead to a ...which controls to implement first, if at ...which controls to ...which controls are important ...

13

Effectiveness Of Security Controls On Electronic Health Records

Effectiveness Of Security Controls On Electronic Health Records

... These controls monitor and control the environment of the workplace and computing facilities and they also monitor and control access to and from such ...information security controls within the ...

8

CLOUD SECURITY: CONTROLS AND ISSUES

CLOUD SECURITY: CONTROLS AND ISSUES

... different security issues and security controls in ...Cloud security basically not any application software that can be offered or given as cloud ...to security services provided by a ...

10

CLOUD SECURITY: CONTROLS AND ISSUES

CLOUD SECURITY: CONTROLS AND ISSUES

... different security issues and security controls in ...Cloud security basically not any application software that can be offered or given as cloud ...to security services provided by a ...

7

Users' perception of the information security policy at Universiti Teknologi Malaysia

Users' perception of the information security policy at Universiti Teknologi Malaysia

... any security breaches or ...crucial security controls in securing the information system, thus, having effective InfoSec policy is vital for any ...comprehensive security programme such as ...

25

Optimization Methodology for Change Management Controls Using Grey Systems Theory

Optimization Methodology for Change Management Controls Using Grey Systems Theory

... Based on the reviewed literature, there have been no other studies that have addressed the evaluation of change management security controls or SCC in organizations. Table I summarizes the literature review ...

19

Enhanced Security Model For Mobile Banking Systems In Tanzania

Enhanced Security Model For Mobile Banking Systems In Tanzania

... enhanced security model for mobile banking systems has been presented in this ...enhanced security controls to be used in securing transactions; the study area being Tanzania to represent many of the ...

17

Abstract In recent decades the nature of IT security

Abstract In recent decades the nature of IT security

... of security incidents, prevailing from 'internal' IT mode (‘common’ attacks and IT incidents) to 'externally' oriented digital environment (advanced and emerging cyber ...information security and cyber ...

6

High Level Security Trust Zones for Private Clouds

High Level Security Trust Zones for Private Clouds

... of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and ...

6

Critical Evaluation of the Challenges Associated With Information System Security Awareness

Critical Evaluation of the Challenges Associated With Information System Security Awareness

... (IS) security is fundamental to protect the confidential data from unwanted ...to security agencies in public sector, the protection IS assets is important from both internal and external ...external ...

14

The United States Antiboycott Law and Other Export Controls

The United States Antiboycott Law and Other Export Controls

... We have not seen the dismantling of foreign policy controls or national security controls on the basis of continued foreign availibility of controlled products; neith[r] ...

10

Title: Reviewing Security Concerns in Cloud Environment

Title: Reviewing Security Concerns in Cloud Environment

... and security engineers.[7] ENISA investigated the different security risks related to adopting cloud computing along with the affected assets, the risks likelihood, impacts, and vulnerabilities in the cloud ...

7

A Framework For Secure Mobile Cloud Computing In Effective Electronic Learning

A Framework For Secure Mobile Cloud Computing In Effective Electronic Learning

... in. Security controls and more measures should be put in ...The security policies should be reviewed to ensure they also cater for and include mobile cloud usage control and ...technology ...

11

Information Security Management in Context of Globalization

Information Security Management in Context of Globalization

... information security management system (ISMS) comprises the development of the security policy at the strategic level, the evaluation of the risks relating to threat occurrence, the determination and ...

13

Effects of Information System Controls on Enhancing Security of Information Systems within Universities: A Case of Public Universities in Western Kenya

Effects of Information System Controls on Enhancing Security of Information Systems within Universities: A Case of Public Universities in Western Kenya

... system security controls on information system security implementation within public universities in Western ...system security controls on secure information system implementation in ...

6

Basic Cyber Hygiene:Does It Work?

Basic Cyber Hygiene:Does It Work?

... of security tools on top of the network can aid in mitigation - rather the hardware should be replaced to ensure ...latest security issues, an example of this in the UK is The Cybersecurity Information ...

12

Survey on Security Challenges, Controls and    Defensive Mechanisms for Mobile Devices

Survey on Security Challenges, Controls and Defensive Mechanisms for Mobile Devices

... the security of cell phones, including making certain controls accessible for buyers to utilize on the off chance that they wish and declaring data about prescribed versatile security ...However, ...

7

A Hermeneutical Examination of Creation in Islam at Georgia State University

A Hermeneutical Examination of Creation in Islam at Georgia State University

... information security controls. These two information security standards are now presented in further ...a security management framework, and detailed recommendations for security ...

147

Show all 10000 documents...

Related subjects