Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Chemical Technology, Control and Management (3)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- International Conference on Information and Communication Technologies (1)
- International Journal of Business and Technology (1)
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Chemical Technology, Control and Management
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Chemical Technology, Control and Management
This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.
Procedural Model Of The Monitoring System, Fayzullajon Botirov
Procedural Model Of The Monitoring System, Fayzullajon Botirov
Chemical Technology, Control and Management
This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
International Journal of Business and Technology
With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
UBT International Conference
With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Masters Theses
Nowadays, paper documents are still frequently used and exchanged in our daily life. To safely manage confidential paper information such as medical and financial records has increasingly become a challenge. If a patient's medical diagnosis get stolen or dumped without shredding, his or her private information would be leaked. Some companies and organizations do not pay enough attention to the problem, letting their customers suffer the loss. In the thesis, I designed a hybrid system to solve this problem effectively and economically. This hybrid system integrates physical document properties with digital security technology, which brings in a revolutionary idea for …
Security@Web: Teaching Security With Alignment In Trust On The Web (Final Report), Li-Chiou Chen, Mary Long
Security@Web: Teaching Security With Alignment In Trust On The Web (Final Report), Li-Chiou Chen, Mary Long
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Quality-Driven Cross Layer Design For Multimedia Security Over Resource Constrained Wireless Sensor Networks, Wei Wang
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the …
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Publications
Computer crime investigation is a multidisciplinary profession and almost no one today has been trained purely as a computer forensic analyst. Toward that end, investigators need professional reference guides and texts that cover the major points of computer forensics. In this article, we discuss some broad issues related to forensic computing and include a review of four texts on the subject:
- Computer Forensics: Incident Response Essentials, Warren G. Kruse II & Jay G. Heiser
- Computer Forensics & Privacy, Michael Caloyannides
- Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, edited by Albert J. …