Information security protection in hybrid office

被引:0
|
作者
Ma, Jun [1 ]
Alias, Syazwina [1 ]
Huang, Chunya [2 ]
机构
[1] SEGi University, Kota Damansara, Selangor, 47810, Malaysia
[2] Guilin Tourism University, Guilin, Guangxi,541006, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer system firewalls - Computer viruses - Cybersecurity - Floods - User interfaces - Virtual addresses
引用
收藏
页码:21 / 25
相关论文
共 50 条
  • [21] PROTECTION AND SECURITY ON THE INFORMATION SUPERHIGHWAY - COHEN,FB
    VALAUSKAS, EJ
    LIBRARY JOURNAL, 1995, 120 (13) : 109 - 109
  • [22] The Security Protection and Technology Analysis of Information System
    Wang, Hua
    Zhao, GuoHong
    Shi, BoShan
    Meng, XianJun
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3130 - 3134
  • [23] Editorial: Protection of national security in information and cyberspace
    Svintsytskyi, Andrii
    Fernandez-Osorio, Andres Eduardo
    REVISTA CIENTIFICA GENERAL JOSE MARIA CORDOVA, 2024, 20 (38):
  • [24] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [25] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [26] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [27] Information security culture and information protection culture: A validated assessment instrument
    Da Veiga, Adele
    Martins, Nico
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (02) : 243 - 256
  • [28] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
  • [29] Hybrid turbo code for information security and reliability
    Sawant, Vidya
    Bhise, Archana
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (02) : 165 - 187
  • [30] Hybrid Encryption Algorithm for Information Security in Hadoop
    Filaly, Youness
    El Mendili, Fatna
    Berros, Nisrine
    Idrissi, Younes El Bouzekri E. L.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 1295 - 1303