Information security: threats and protection mechanisms

被引:0
|
作者
Howard, A [1 ]
Paridaens, O
Gamm, A
机构
[1] Ottawa Secur Res & Innovat Grp, Res, Ottawa, ON, Canada
[2] Alcatel Corp CTO Network Strategy Grp, Task Force Secur Technol, Antwerp, Belgium
[3] Alcatel NGN, Network Architecture Grp, Stuttgart, Germany
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the value of data sent over networks increases, it is becoming more and more important to implement effective information security measures.
引用
收藏
页码:117 / 121
页数:5
相关论文
共 50 条
  • [1] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [2] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [3] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    [J]. DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [4] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    [J]. 2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [5] A variety of information security threats
    Kovalenko, Kseniya E.
    Kovalenko, Natalia E.
    Leon Gonzalez, Jorge Luis
    [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2019, 11 (05): : 256 - 261
  • [6] Ongoing Threats to Information Protection
    Whitman, Michael
    Mattord, Herbert
    [J]. PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [7] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [8] Android Mobile Security - Threats and Protection
    Mu, Jiayi
    Cui, Ailing
    Rao, Jingyu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 683 - 686
  • [9] EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS
    Masrek, Mohamad Noorman
    Soesantari, Tri
    Khan, Asad
    Dermawan, Aang Kisnu
    [J]. INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY, 2020, 21 (03): : 1203 - 1214
  • [10] Enemy at the gate: Threats to information security
    Whitman, ME
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (08) : 91 - 95