information security 2018





A signature based information security system for vitality proficient information accumulation in wireless sensor systems
free download

Information conglomeration procedures have been generally utilized as a part of wireless sensor systems (WSNs) to take care of the vitality imperative issues of sensor hubs. They can preserve the huge measure of vitality by decreasing information bundle transmission

Construction methodology of information security system of banking information in automated banking systems
free download

Topicality. In modern conditions, as practice has shown, the important role in ensuring the national security of Ukraine, and especially its economic component, belongs to the processes of ensuring information security of the state in the banking sector (BNC). A key

INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE.
free download

Due to the fact that cloud computing bring with them new challenges in the field of information security , it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for

Features of ensuring information security when using cloud technologies in educational institutions
free download

Annotation: The use of cloud technologies in the activity of an educational organization provides certain advantages and creates new opportunities both for inclusion in the educational process and for forming a management system for the educational organization

The altmetrics for measuring readers intentions towards scholarly contents in the field of information security
free download

This study aimed to apply altmetrics tools to measure readers intentions towards the highly cited contents in the field of information security among specific types of scholarly documents and therefore investigate the correlation between the citations (Bibiliometrics)

Implementation of AES Algorithm for Information Security of Web-Based Application
free download

This study focused on designing a web-based information security system to secure text and image files using the AES (Advanced Encryption Standard) algorithm to encrypt and decrypt text and image files. This web-based system is designed to help users easily access

Introduction to information security foundations and applications
free download

1.1 Background Information security has extended to include several research directions like user authentication and authorization, network security , hardware security , software security , and data cryptography. Information security has become a crucial need for protecting almost

Shadow cyber threat intelligence and its use in information security and risk management processes
free download

Cyber threat intelligence is obtained in an unstructured and ad-hoc manner from publicly available cyber security information sources such as security expert blogs or mailing lists. Although these information sources are used by employees as input for critical information

Security level analysis of academic information systems based on standard iso 27002: 2013 using Sse-Cmm
free download

this research was conducted to find out the level of information security in organization to give recommendations improvements in information security management at the organization. This research uses the ISO 27002 by involving the entire clause that exists in

Information Resources Sharing Security in Cloud Computing [J]
free download

With the wide application of cloud computing, cloud computing security issues are now becoming more and more popular. By analyzing the security of information resources sharing in cloud computing environment, this paper discusses the technical, political and

Legal, ethical, and professional issues in information security
free download

E WARREN- Retrieved 31st January baburd.com.npAs a future information security professional, you must understand the scope of an organizations legal and ethical responsibilities. The information security professional plays an important role in an organizations approach to managing liability for privacy and security

A study on factors of information security investment in the fourth industrial revolution
free download

In the era of the 4th Industrial Revolution, information security threats are expanding from the cyber world to the real world, even threatening safety beyond information leakage. Recently, companies have been introducing new technologies such as mobile, wireless LAN, Big

Measuring the information security maturity of enterprises under uncertainty using fuzzy AHP
free download

Generally, measuring the Information Security maturity (ISM) is the first step to build a new knowledge information security management system in an organization. Knowing the ISM level helps organizations decide the type of protection strategies and policies will be taken

A Multi-Science Study of Modern Synergetic War and Its Information Security Component
free download

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions ofThis volume presents the proceedings of the International Conference on Emerging Technologies in Data Mining and Information Security , IEMIS 201 which took place at the University of Engineering and Management, Kolkata, India, from February 23 to 2 2018

Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources
free download

In the article the question of Security estimation of information system protection through risk analysis is considered. An analysis of information risks is conducted for testing information security system, which allows to identify threats to information security . At present, different

Awareness in Information Security
free download

The digital transformation taking place in society is changing social behavior. Technical developments must be understood and designed in an acceptable user-friendly way. In line with the General Data Protection Regulation (GDPR) of the European Union (EU)

Incentives for human agents to share security information : a model and an empirical test
free download

In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between human agents working in institutions. We present an incentive-based SIS system model that is empirically tested with an exclusive dataset. The data was collected with an

The significance of main constructs of theory of planned behavior in recent information security policy compliance behavior study: A comparison among top
free download

For a decade since year of 2000 until 20 Theory of Planned Behavior [TPB] and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there

Information Security Education: Watching your steps in cyberspace
free download

This paper discusses the importance of providing at least a basic education in information security to all users of any information and communication system, regardless of whether they are information technology professionals, students of computer or information sciences CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER