Every sector in the global economy, from energy, through transportation, finance and banking, telecommunications, public health, emergency services, water, chemical, defense, right down to the industrial, and agriculture sectors, is totally dependent on the reliable functioning of its IT assets. Thus anything that threatens these effectively poses a threat to our way of life. And accordingly, almost any effort expended to protect them is both justifiable and necessary. So the obvious question is… “What is the current state of affairs”?
The effectiveness of modern computer applications is normally regarded as a function of five basic a...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Abstract: Data security is a crucial issue in new millenium because the business world uses the ICT....
The explosive growth of digital communications since the advent of the internet has been accelerated...
<p>Poster presentation at the 2016 Defence and Security Doctoral Symposium.</p><p>It could be argued...
Modern global economic and political conditions, technological infrastructure, and socio-cultural de...
Modern global economic and political conditions, technological infra-structure, and socio-cultural d...
Until recently, if it has been considered at all in the context of business continuity, cyber securi...
Security was not a major concern of the past in Information Technology Organizations. But presently,...
Modern global economic and political conditions, technological infrastructure, and socio-cultural de...
Companies and individuals are becoming more dependant on technology, automated processes, the Intern...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
The effectiveness of modern computer applications is normally regarded as a function of five basic a...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Abstract: Data security is a crucial issue in new millenium because the business world uses the ICT....
The explosive growth of digital communications since the advent of the internet has been accelerated...
<p>Poster presentation at the 2016 Defence and Security Doctoral Symposium.</p><p>It could be argued...
Modern global economic and political conditions, technological infrastructure, and socio-cultural de...
Modern global economic and political conditions, technological infra-structure, and socio-cultural d...
Until recently, if it has been considered at all in the context of business continuity, cyber securi...
Security was not a major concern of the past in Information Technology Organizations. But presently,...
Modern global economic and political conditions, technological infrastructure, and socio-cultural de...
Companies and individuals are becoming more dependant on technology, automated processes, the Intern...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
The effectiveness of modern computer applications is normally regarded as a function of five basic a...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...
oai:conceptechint.conceptechint.net:article/36In our connected world security and proof (evidence co...