In this regard, this paper summarizes some major trends for realization of future digital computer and communication components, structures and principles, and resulting new challenges for data and information security. At first, in Section 2, major technological and technical trends will be summarized...
In addition to direct information security threats, organizations face multiple challenges when building and managing a robust InfoSec strategy and system. Complacency Complexity Global connections Inflexibility Third-party integration Complacency With a new system in place, there might be a tendency to wa...
Knowing why you are doing an information security risk assessment and knowing its components can help you make sense of the different methodologies and frameworks out there. Drivers, Laws, and Regulations In this section we primarily learned about the major US laws and regulations that directly or...
Accounting informatization is an important product of the information society, which promotes the transformation of enterprise management models. It is also a major measure to conform to the development of science and technology and integrate enterprise resources. It can promote the optimization of enterp...
For example, a major retailer will be more likely to be exploited than a local business with a single credit card machine, even if the two organizations have the same vulnerability. Why is that? It isn't that the weakness couldn't be found just as easily in both companies' systems, it...
The paper describes taxonomies and safety and security challenges posed by the integration of process control systems and information and communication technology (ICT). Taxonomies and safety and security in process control and ICT are explored, to establish a framework to be used. A description of ...
The questionnaire had two major parts. The first part measured the participant's awareness of computer security. The second part measured their awareness of ethical computer use. In general, the majority of the participants had a satisfactory awareness of computer security and ethics. However, as...
The complex and interdependent nature of smart cities raises significant political, technical, and socioeconomic challenges for designers, integrators and
given the large number of state elements in the hardwareunits and many control signals influencing their mutual interaction, validating the security of a commercial computing platform thoroughly can be complicated and intractable. By exemplifying challenges to correctly implement security, it is necessary...
it is better not to show IT risk with a hierarchic dependency on one of the other risk categories (ISACA, 2009). Cloud computing is the most influential IT-enabling trend in business today. Thus, many organizations adoptcloud computingand consider it the nextmajor milestonein technology and bus...