-
1Academic Journal
المصدر: Transforming Government: People, Process and Policy, 2024, Vol. 19, Issue 1, pp. 159-182.
-
2Book
المؤلفون: Souppaya, Murugia
مصطلحات موضوعية: Anti-virus, Authentication, Computer security, COTS, Email, Encryption, Firewall, Hardening, IPsec, Lockdown, Malware, Microsoft, Operating system, Security checklist, Security configuration, Security controls, Security policy, Security templates, Spyware, Threats, W
-
3
المؤلفون: Bergström, Erik, Andersson, Simon, Lundgren, Martin
المصدر: VISKA Human Aspects of Information Security and Assurance IFIP Advances in Information and Communication Technology. :107-119
مصطلحات موضوعية: Cybersecurity, Information security, Risk analysis, Risk assessment, Cyber security, Information assets, Organisational, Public sector organization, Risk analyze, Risks management, Security controls, Security experts, Semi structured interviews, Swedishs, Information Systems, Informationssystem (IS)
وصف الملف: print
-
4
المؤلفون: Djebbar, Fatiha, Nordström, Kim
المصدر: IEEE Access. 11:85315-85332
مصطلحات موضوعية: cybersecurity, security controls, security standards, cybersecurity concepts, threats, security requirements
وصف الملف: electronic
-
5eBook
المؤلفون: Green, Mark, author
المصدر: National Security Law, Procedure and Practice, 2024.
-
6Academic Journal
المؤلفون: Sergio Huaman, Luis Ponce, Lenis Wong
المصدر: Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 35, Iss 1, Pp 266-https://youtu.be/h3T5P8gS4CI (2024)
مصطلحات موضوعية: information access management, cmmi, security controls, iso/iec 27001, Telecommunication, TK5101-6720
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Nadher Alsafwani, Yousef Fazea, Fuad Alnajjar
المصدر: Information, Vol 15, Iss 6, p 353 (2024)
مصطلحات موضوعية: information security, security frameworks, security controls evaluation, threat analysis, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
8Academic Journal
المؤلفون: Grigaliūnas, Šarūnas, Schmidt, Michael, Brūzgienė, Rasa, Smyrli, Panayiota, Andreou, Stephanos, Lopata, Audrius
المصدر: Electronics., Basel : MDPI, 2024, vol. 13, iss. 19, art. no. 3955, p. 1-31. ; ISSN 2079-9292
مصطلحات موضوعية: information security, security controls, OpSec, TechSec, HumSec, PhySec
وصف الملف: application/pdf
-
9Academic Journal
المؤلفون: Bandon Alegria, Diego Bedrinana, Lenis Wong
المصدر: Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 32, Iss 1, Pp 38-48 (2022)
مصطلحات موضوعية: iomt, iomt architecture, iso 27001 security controls, iomt security, remote patient monitoring, Telecommunication, TK5101-6720
وصف الملف: electronic resource
-
10
المؤلفون: Felício, Carol Cristina Gonçalves
المساهمون: Romão, Mário, Repositório da Universidade de Lisboa
مصطلحات موضوعية: Software Security Requirements, Security Policy, Security Objectives, Software Security Controls, Software Development, Application Security, Requisitos de Segurança de Software, Política de Segurança, Objectivos de Segurança, Controlos de Segurança do Software, Desenvolvimento de software, Segurança das aplicações
وصف الملف: application/pdf
Relation: Felício, Carol Cristina Gonçalves (2022). “Minimum viable applications security and controls : a case study in the pharmaceutical sector”. Dissertação de Mestrado. Universidade de Lisboa. Instituto Superior de Economia e Gestão
الاتاحة: http://hdl.handle.net/10400.5/24630
-
11
-
12Academic Journal
المؤلفون: Sang Min Han, Chanyoung Lee, Young Ho Chae, Poong Hyun Seong
المصدر: Nuclear Engineering and Technology, Vol 54, Iss 4, Pp 1245-1252 (2022)
مصطلحات موضوعية: Nuclear power plants, Cyber threats, Security controls, RS-015, Implementation strategies, Nuclear engineering. Atomic power, TK9001-9401
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Diéguez Rebolledo, Mauricio, Cares Gallardo, Carlos, Cachero, Cristina, Hochstetter Diez, Jorge Alberto
المساهمون: Universidad de Alicante. Departamento de Lenguajes y Sistemas Informáticos, Advanced deveLopment and empIrical research on Software (ALISoft)
مصطلحات موضوعية: Information security management, Selection of security controls, Security risk, Security standards, Optimization problem, Operational research, Intention to adoption
Relation: https://doi.org/10.3390/app13021094; Diéguez M, Cares C, Cachero C, Hochstetter J. MASISCo—Methodological Approach for the Selection of Information Security Controls. Applied Sciences. 2023; 13(2):1094. https://doi.org/10.3390/app13021094; http://hdl.handle.net/10045/131086
-
14Academic Journal
المؤلفون: Zhang, Y, Malacaria, P, Loukas, G, Panaousis, E
مصطلحات موضوعية: Smart home security, Mathematical optimisation, Security controls, IoT, Artificial intelligence
Relation: COMPUTERS & SECURITY; ARTN 103250; https://qmro.qmul.ac.uk/xmlui/handle/123456789/86902
-
15Academic Journal
المصدر: Applied Sciences; Volume 13; Issue 15; Pages: 9032
مصطلحات موضوعية: IoT cyber risk management, cyber risk assessment, cyber risk control, security controls, Internet of Things, survey, IoT
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: Electrical, Electronics and Communications Engineering; https://dx.doi.org/10.3390/app13159032
الاتاحة: https://doi.org/10.3390/app13159032
-
16Academic Journal
المؤلفون: Nisha Rawindaran, Liqaa Nawaf, Suaad Alarifi, Daniyal Alghazzawi, Fiona Carroll, Iyad Katib, Chaminda Hewage
المصدر: Digital; Volume 3; Issue 3; Pages: 200-231
مصطلحات موضوعية: cyber security, ECC, awareness, security mindset, culture, cyber essentials, ISO27001, Industry 5.0, small and medium-sized enterprises (SMEs), governance, policy, Saudi Arabia, United Kingdom, compliance, cyber security controls
وصف الملف: application/pdf
-
17Academic Journal
المؤلفون: Sigüenza-Cárdenas, Teresa de Jesús, Torres-Soto, Carlos Andrés, Saltos-Bernal, Ginger Viviana
المصدر: MQRInvestigar; Vol. 7 No. 4 (2023): Edition frequency from October to December ; 863-878 ; MQRInvestigar ; Vol. 7 Núm. 4 (2023): Edición frecuencia de Octubre a Diciembre ; 2588-0659
مصطلحات موضوعية: riesgo, seguridad, control de seguridad, mesa de ayuda, gestión de incidentes, ISO 27002, risks, security, security controls, help desk, incident management
وصف الملف: application/pdf; text/html; text/xml
Relation: https://www.investigarmqr.com/ojs/index.php/mqr/article/view/739/2926; https://www.investigarmqr.com/ojs/index.php/mqr/article/view/739/2927; https://www.investigarmqr.com/ojs/index.php/mqr/article/view/739/2928; https://www.investigarmqr.com/ojs/index.php/mqr/article/view/739/2929; https://www.investigarmqr.com/ojs/index.php/mqr/article/view/739
-
18Academic Journal
المؤلفون: Eufemia Lella, Giovanni Schmid
المصدر: Cryptography, Vol 7, Iss 4, p 53 (2023)
مصطلحات موضوعية: quantum key distribution, unconditional secrecy, threat analysis, security controls, post-quantum cryptography, Technology
Relation: https://www.mdpi.com/2410-387X/7/4/53; https://doaj.org/toc/2410-387X; https://doaj.org/article/ee3070f249fa46bc9075904bfef8a927
-
19Academic Journal
المؤلفون: Nykänen, Riku, Kelo, Tomi, Kärkkäinen, Tommi
مصطلحات موضوعية: Security Audit Criteria, Security Assessment, Information Security Controls, Design Science Research, tietoturva, tietoturvapolitiikka, kehittämistutkimus, auditointi, standardit
وصف الملف: application/pdf; 25-39; fulltext
Relation: Journal of Information Warfare; https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria; 22; CONVID_207657282
-
20Academic Journal
المؤلفون: Endro Joko Wibowo, Kalamullah Ramli
المصدر: Jurnal Sistem Informasi, Vol 18, Iss 2 (2022)
مصطلحات موضوعية: Security Risk Management, information security controls, Cyber Security Maturity, ISO/IEC 27005:2018, ISO/IEC 27002:2013, Information technology, T58.5-58.64
وصف الملف: electronic resource