Showing 1 - 10 of 48,663
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their...
Persistent link: https://www.econbiz.de/10015100709
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de/10015135607
Persistent link: https://www.econbiz.de/10014582258
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This...
Persistent link: https://www.econbiz.de/10014754665
Persistent link: https://www.econbiz.de/10011803045
Due to the inadequate mamagement of information security expectations and various unexpected information technology incidents, small and medium enterprises that lose data or have to cope with a lack of data over a certain period of time may lose business commissions or customers. A solution to...
Persistent link: https://www.econbiz.de/10008853241
Effectiveness of ISO 27001 as an information security system is a measure of the expectation satisfaction level based on the organizational expectations prior to implementation of ISO 27001 and the actual results obtained after certification. Thus, effectiveness focuses on how well objectives...
Persistent link: https://www.econbiz.de/10010858094
Persistent link: https://www.econbiz.de/10012493788
Persistent link: https://www.econbiz.de/10011737491
Persistent link: https://www.econbiz.de/10011984159