The state of information security

被引:10
|
作者
Potts, Mike [1 ]
机构
[1] Lancope
关键词
D O I
10.1016/S1353-4858(12)70064-8
中图分类号
学科分类号
摘要
引用
收藏
页码:9 / 11
相关论文
共 50 条
  • [41] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [42] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [43] State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents
    Kryshtanovych, Myroslav
    Britchenko, Igor
    Losonczi, Peter
    Baranovska, Tetiana
    Lukashevska, Ulyana
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 33 - 38
  • [44] The Information Security Needs in Radiological Information Systems-an Insight on State Hospitals of Iran, 2012
    Farhadi, Akram
    Ahmadi, Maryam
    JOURNAL OF DIGITAL IMAGING, 2013, 26 (06) : 1040 - 1044
  • [45] Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation
    Sukhoparov, M. E.
    Lebedev, I. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 1071 - 1075
  • [46] Tasks and powers of the National police of Ukraine in ensuring information security of the state
    Vitalii, Makarchuk
    Oleksandr, Nikitenko
    Oleksandr, Dotsenko
    Oleksii, Kopan
    Serhii, Kitsul
    AMAZONIA INVESTIGA, 2021, 10 (37): : 86 - 92
  • [47] An Efficient Security Method Based on Exploiting Channel State Information (CSI)
    Hamamreh, Jehad M.
    Furqan, Haji M.
    Ali, Zain
    Sidhu, Guftaar Ahmad Sardar
    2017 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2017, : 288 - 293
  • [48] Information security matters: What is information security worth?
    Ross, Steven J.
    ISACA Journal, 2019, 2 : 4 - 6
  • [49] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [50] Information Security of the State Under Conditions of Hybrid Warfare: Mechanisms of Ensuring
    Ablazov, Ivan
    Harkavyi, Yevhenii
    Mokliak, Sergii
    Rubel, Karina
    Smolianiuk, Volodymyr
    KHAZAR JOURNAL OF HUMANITIES AND SOCIAL SCIENCES, 2023, 26 (01): : 51 - 63